Auto-Update: 2025-03-14T21:00:20.865366+00:00

This commit is contained in:
cad-safe-bot 2025-03-14 21:03:52 +00:00
parent 2cdca09f5d
commit 367cbdb06d
121 changed files with 2604 additions and 631 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0367",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-06-25T04:00:00.000",
"lastModified": "2025-02-07T15:15:09.513",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:07:51.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0210",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-06T04:00:00.000",
"lastModified": "2025-02-07T15:15:10.580",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:07:41.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-2773",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-09-02T23:03:00.000",
"lastModified": "2025-02-07T15:15:11.043",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:07:33.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-5659",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-12T19:00:00.000",
"lastModified": "2025-02-07T15:15:11.533",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:07:21.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0655",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-07T21:00:00.000",
"lastModified": "2025-02-07T15:15:11.747",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:07:27.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-3431",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-05T19:41:00.000",
"lastModified": "2025-02-10T20:15:30.473",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:06:46.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2010-5326",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-05-13T10:59:00.173",
"lastModified": "2025-02-07T14:15:33.713",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:33:36.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2011-1823",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-06-09T10:36:27.680",
"lastModified": "2025-02-07T15:15:12.017",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:06:36.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2011-4723",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-12-20T11:55:08.413",
"lastModified": "2025-02-10T20:15:32.090",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:06:23.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2012-1889",
"sourceIdentifier": "secure@microsoft.com",
"published": "2012-06-13T04:46:46.190",
"lastModified": "2025-02-04T19:15:20.240",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:06:09.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-0074",
"sourceIdentifier": "secure@microsoft.com",
"published": "2013-03-13T00:55:01.137",
"lastModified": "2025-02-10T19:15:31.407",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:05:51.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-3896",
"sourceIdentifier": "secure@microsoft.com",
"published": "2013-10-09T14:53:25.230",
"lastModified": "2025-02-10T19:15:32.397",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:16:52.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-5223",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-11-19T04:50:12.063",
"lastModified": "2025-02-07T15:15:13.867",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:48:19.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-7331",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-02-26T14:55:08.520",
"lastModified": "2025-02-10T21:15:10.747",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:04.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-0322",
"sourceIdentifier": "secure@microsoft.com",
"published": "2014-02-14T16:55:07.500",
"lastModified": "2025-02-10T19:15:32.577",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:00.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-1776",
"sourceIdentifier": "secure@microsoft.com",
"published": "2014-04-27T10:55:03.340",
"lastModified": "2025-02-10T20:15:36.007",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:12.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-2817",
"sourceIdentifier": "secure@microsoft.com",
"published": "2014-08-12T21:55:07.007",
"lastModified": "2025-02-10T19:15:32.817",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:23.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-3120",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-07-28T19:55:04.490",
"lastModified": "2025-02-10T21:15:11.320",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:18.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -100,8 +100,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.1",
"matchCriteriaId": "B31061F1-66B7-4F12-93CE-685F82BCB17B"
"versionEndExcluding": "1.2",
"matchCriteriaId": "985437E6-A916-4359-8EB6-45C35ABA0742"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-4123",
"sourceIdentifier": "secure@microsoft.com",
"published": "2014-10-15T10:55:08.037",
"lastModified": "2025-02-10T19:15:33.517",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:31.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-1427",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-02-17T15:59:04.560",
"lastModified": "2025-02-10T19:15:34.320",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:38.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-2590",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2015-07-16T10:59:17.050",
"lastModified": "2025-02-10T18:15:23.163",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:33:22.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-4068",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-05-29T15:59:23.327",
"lastModified": "2025-02-04T21:15:09.290",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:17:45.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-20017",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-19T05:15:08.817",
"lastModified": "2025-02-03T15:15:10.597",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:00:42.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-1000486",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-03T20:29:00.643",
"lastModified": "2025-02-07T14:15:41.997",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:05:18.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -156,7 +156,8 @@
"url": "https://cryptosense.com/weak-encryption-flaw-in-primefaces/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -187,7 +188,8 @@
"url": "https://cryptosense.com/weak-encryption-flaw-in-primefaces/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-11317",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-08-23T17:29:00.177",
"lastModified": "2025-02-07T15:15:14.543",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:54:20.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-11357",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-08-23T17:29:00.227",
"lastModified": "2025-02-07T15:15:14.730",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:05:11.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-6884",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-04-06T17:59:00.163",
"lastModified": "2025-02-04T16:15:30.533",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:33:54.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-7269",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-27T02:59:00.453",
"lastModified": "2025-02-04T21:15:13.193",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:33:44.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -120,8 +120,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C954A7-FF84-4DEB-8728-5B207F374ECC"
"criteria": "cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B4DF95D-B4B1-4FB6-9D27-A6D359EEACFA"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-8291",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-04-27T01:59:02.057",
"lastModified": "2025-02-04T21:15:13.427",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:34:14.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-9248",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-03T19:29:00.270",
"lastModified": "2025-02-07T15:15:14.937",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:05:03.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-11138",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-05-31T18:29:00.557",
"lastModified": "2025-02-07T17:15:10.807",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:06:53.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-1273",
"sourceIdentifier": "security_alert@emc.com",
"published": "2018-04-11T13:29:00.290",
"lastModified": "2025-02-07T13:15:24.193",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:54:07.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -101,11 +101,11 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-14847",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-08-02T07:29:00.280",
"lastModified": "2025-02-04T21:15:14.093",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:06:59.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -152,7 +152,8 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -211,7 +212,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-25099",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T05:15:06.007",
"lastModified": "2024-11-21T04:03:33.547",
"lastModified": "2025-03-14T19:15:38.577",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://github.com/DCIT/perl-CryptX/issues/47",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-6789",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-08T23:29:01.170",
"lastModified": "2025-02-07T14:15:44.870",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:05:26.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-6882",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-27T16:29:00.530",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:05:57.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -182,14 +182,16 @@
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=108786",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
"Issue Tracking",
"Permissions Required"
]
},
{
@ -227,14 +229,16 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=108786",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
"Issue Tracking",
"Permissions Required"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-7600",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2018-03-29T07:29:00.260",
"lastModified": "2025-02-07T13:15:24.433",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:50:41.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -180,7 +180,8 @@
"source": "mlhess@drupal.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -188,14 +189,16 @@
"source": "mlhess@drupal.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
"url": "https://badpackets.net/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018-7600/",
"source": "mlhess@drupal.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -225,7 +228,8 @@
"source": "mlhess@drupal.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -254,21 +258,24 @@
"url": "https://twitter.com/RicterZ/status/979567469726613504",
"source": "mlhess@drupal.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
"url": "https://twitter.com/RicterZ/status/984495201354854401",
"source": "mlhess@drupal.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
"url": "https://twitter.com/arancaytar/status/979090719003627521",
"source": "mlhess@drupal.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -331,7 +338,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -339,14 +347,16 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
"url": "https://badpackets.net/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018-7600/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -376,7 +386,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -405,21 +416,24 @@
"url": "https://twitter.com/RicterZ/status/979567469726613504",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
"url": "https://twitter.com/RicterZ/status/984495201354854401",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
"url": "https://twitter.com/arancaytar/status/979090719003627521",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-7602",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2018-07-19T17:29:00.373",
"lastModified": "2025-02-07T13:15:24.790",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:50:35.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9276",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-02T16:29:00.600",
"lastModified": "2025-02-05T02:00:01.767",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:39:51.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-12481",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-30T23:29:00.267",
"lastModified": "2024-11-21T04:22:56.877",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:08:51.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
@ -85,8 +85,25 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.1",
"versionEndIncluding": "0.7.1",
"matchCriteriaId": "63796DE5-6E54-4005-A4B6-DF86C592E08A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
@ -104,7 +121,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/gpac/gpac/issues/1249",
@ -116,7 +137,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-12482",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-30T23:29:00.313",
"lastModified": "2024-11-21T04:22:57.010",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:09:03.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
@ -85,8 +85,25 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E"
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.1",
"versionEndIncluding": "0.7.1",
"matchCriteriaId": "63796DE5-6E54-4005-A4B6-DF86C592E08A"
}
]
}
@ -104,7 +121,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/gpac/gpac/issues/1249",
@ -116,7 +137,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-12483",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-30T23:29:00.343",
"lastModified": "2024-11-21T04:22:57.150",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:09:12.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
@ -85,8 +85,25 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E"
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.6.1",
"versionEndIncluding": "0.7.1",
"matchCriteriaId": "63796DE5-6E54-4005-A4B6-DF86C592E08A"
}
]
}
@ -104,7 +121,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/gpac/gpac/issues/1249",
@ -116,7 +137,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-13608",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-29T19:15:13.227",
"lastModified": "2025-02-04T20:15:32.543",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:39:08.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,8 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -36,15 +36,13 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-18988",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-07T16:15:10.033",
"lastModified": "2025-02-04T21:15:18.430",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:50:21.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -140,7 +140,8 @@
"url": "https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?threadtype=label&labels=Security",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Vendor Advisory",
"Broken Link"
]
},
{
@ -169,7 +170,8 @@
"url": "https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?threadtype=label&labels=Security",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
"Vendor Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20500",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-05T15:15:11.253",
"lastModified": "2025-02-04T21:15:19.090",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:50:11.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-25211",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-29T00:15:02.107",
"lastModified": "2024-11-21T04:40:00.980",
"lastModified": "2025-03-14T19:15:39.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-10221",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-08T22:15:11.120",
"lastModified": "2025-02-04T20:15:34.620",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:38:55.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-10987",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-07-13T19:15:12.207",
"lastModified": "2025-02-04T20:15:34.827",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:38:42.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-13671",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2020-11-20T16:15:15.433",
"lastModified": "2025-02-07T13:15:28.997",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:50:29.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-7961",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-20T19:15:12.737",
"lastModified": "2025-02-04T20:15:39.207",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:38:00.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -120,8 +120,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*",
"versionEndIncluding": "7.2.0",
"matchCriteriaId": "484E2316-EBD8-4CB8-B867-ADADA119957C"
"versionEndExcluding": "7.2.1",
"matchCriteriaId": "B8EDC50D-2FE2-4895-8B8A-E869D194162F"
}
]
}
@ -156,7 +156,8 @@
"url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Vendor Advisory",
"Broken Link"
]
},
{
@ -194,7 +195,8 @@
"url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
"Vendor Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27104",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-02-16T21:15:13.280",
"lastModified": "2025-02-03T15:15:13.040",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:48:03.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -133,7 +133,8 @@
"url": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27104.txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -148,7 +149,8 @@
"url": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27104.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46989",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:37.687",
"lastModified": "2024-11-21T06:35:08.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T19:02:38.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,54 +39,154 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19",
"versionEndExcluding": "4.19.191",
"matchCriteriaId": "64B18B0C-5B02-4506-ADE4-6B1430542B99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.120",
"matchCriteriaId": "2BDC71CF-4451-4D53-93E9-61DE7C4E25B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "2BB4E5E8-4AAD-475A-A1B9-F287254C7D72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-26143",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-10T17:47:32.813",
"lastModified": "2025-01-29T17:15:17.873",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:00:05.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -175,7 +175,8 @@
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -231,7 +232,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-26318",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-04T18:15:08.367",
"lastModified": "2025-01-29T17:15:18.433",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:59:55.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29499",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-26T02:15:37.107",
"lastModified": "2025-01-29T17:15:19.870",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:00:30.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31199",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-08T01:15:09.767",
"lastModified": "2025-02-03T15:15:14.033",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:47:20.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-3598",
"sourceIdentifier": "cve@gitlab.com",
"published": "2022-10-21T16:15:11.030",
"lastModified": "2024-11-21T07:19:50.973",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:10:12.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -81,8 +81,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndIncluding": "4.4.0",
"matchCriteriaId": "6E0B7DC1-7265-4D0F-9400-1559C3378D18"
"matchCriteriaId": "13FB78A9-3D60-41C4-9245-812E2695017D"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-44877",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-05T23:15:09.150",
"lastModified": "2025-01-29T16:15:31.253",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:00:50.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45677",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T14:15:13.667",
"lastModified": "2024-11-21T07:29:35.210",
"lastModified": "2025-03-14T19:15:39.943",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-489"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46637",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T21:15:10.890",
"lastModified": "2024-11-21T07:30:50.047",
"lastModified": "2025-03-14T19:15:40.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4785",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:11.603",
"lastModified": "2024-11-21T07:35:56.280",
"lastModified": "2025-03-14T19:15:40.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48340",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T02:15:10.217",
"lastModified": "2024-11-21T07:33:12.410",
"lastModified": "2025-03-14T19:15:40.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49187",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:00:55.803",
"lastModified": "2025-02-26T07:00:55.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-14T20:57:56.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: Arreglar clk_hw_get_clk() cuando dev es NULL Cualquier estructura clk_core registrada puede tener un puntero NULL en su campo dev. Si bien nunca se document\u00f3 realmente, esto se evidencia por el amplio uso de clk_register y clk_hw_register con un puntero de dispositivo NULL, y el hecho de que la funci\u00f3n principal of_clk_hw_register() tambi\u00e9n pasa un puntero de dispositivo NULL. Una llamada a clk_hw_get_clk() en una estructura clk_hw cuyo clk_core est\u00e1 en ese caso dar\u00e1 como resultado una desreferencia de puntero NULL cuando llame a dev_name() en ese puntero de dispositivo NULL. Agregue una prueba para este caso y use NULL como dev_id si el puntero del dispositivo es NULL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.33",
"matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.19",
"matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "5.17.2",
"matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c1b56df451716ba207bbf59f303473643eee4fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/23f89fe005b105f0dcc55034c13eb89f9b570fac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4be3e4c05d8dd1b83b75652cad88c9e752ec7054",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d183f20cf5a7b546d4108e796b98210ceb317579",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0271",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:12.187",
"lastModified": "2024-11-21T07:36:52.207",
"lastModified": "2025-03-14T19:15:40.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0380",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:12.673",
"lastModified": "2024-11-21T07:37:04.923",
"lastModified": "2025-03-14T19:15:40.897",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0559",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-21T09:15:13.330",
"lastModified": "2024-11-21T07:37:24.097",
"lastModified": "2025-03-14T19:15:41.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22952",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-11T09:15:08.787",
"lastModified": "2025-01-29T16:15:35.047",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:00:58.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24080",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T23:15:11.543",
"lastModified": "2024-11-21T07:47:22.647",
"lastModified": "2025-03-14T19:15:41.250",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-307"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24081",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T23:15:11.600",
"lastModified": "2024-11-21T07:47:22.790",
"lastModified": "2025-03-14T19:15:41.457",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24184",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T15:15:12.197",
"lastModified": "2024-11-21T07:47:32.760",
"lastModified": "2025-03-14T19:15:41.630",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26249",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T02:15:10.293",
"lastModified": "2024-11-21T07:50:58.890",
"lastModified": "2025-03-14T19:15:41.807",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-770"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26253",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T02:15:10.367",
"lastModified": "2024-11-21T07:50:59.030",
"lastModified": "2025-03-14T19:15:41.997",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26265",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T04:15:10.637",
"lastModified": "2024-11-21T07:51:00.530",
"lastModified": "2025-03-14T19:15:42.207",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26266",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T04:15:10.693",
"lastModified": "2024-11-21T07:51:00.667",
"lastModified": "2025-03-14T19:15:42.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26267",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-21T09:15:13.597",
"lastModified": "2024-11-21T07:51:00.803",
"lastModified": "2025-03-14T19:15:43.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28461",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-15T23:15:10.070",
"lastModified": "2025-02-10T19:15:36.877",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T20:01:09.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30774",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-19T15:15:08.923",
"lastModified": "2024-11-21T08:00:52.747",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:09:26.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,8 +66,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libtiff:libtiff:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13A056CA-3182-4568-9318-3982E02D671C"
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5.1",
"versionEndIncluding": "4.4.0",
"matchCriteriaId": "E05D8B0C-6AE1-497D-96BF-374E0D63321A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-37057",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-17T21:15:50.380",
"lastModified": "2024-11-21T08:11:00.917",
"lastModified": "2025-03-14T20:15:12.080",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "http://jlink.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48957",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-25T17:15:03.553",
"lastModified": "2024-09-11T18:07:49.180",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T20:15:12.273",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7233",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-02-12T16:15:08.390",
"lastModified": "2024-11-21T08:45:34.233",
"lastModified": "2025-03-14T19:15:43.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7261",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-06-07T20:15:10.887",
"lastModified": "2024-12-26T16:07:39.820",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T20:15:12.477",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-233"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1694",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-06-07T20:15:10.973",
"lastModified": "2024-12-26T16:09:24.467",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T19:15:43.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-474"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21137",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:14.437",
"lastModified": "2024-11-21T08:53:51.363",
"lastModified": "2025-03-14T19:15:43.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21159",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.517",
"lastModified": "2024-11-21T08:53:53.920",
"lastModified": "2025-03-14T19:15:44.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21179",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:22.090",
"lastModified": "2024-11-21T08:53:56.313",
"lastModified": "2025-03-14T20:15:12.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22020",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-07-09T02:15:09.973",
"lastModified": "2024-11-22T12:15:18.453",
"lastModified": "2025-03-14T19:15:44.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22280",
"sourceIdentifier": "security@vmware.com",
"published": "2024-07-11T05:15:10.123",
"lastModified": "2024-11-21T08:55:57.290",
"lastModified": "2025-03-14T19:15:44.857",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25226",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-14T15:15:09.767",
"lastModified": "2024-11-21T09:00:30.627",
"lastModified": "2025-03-14T19:15:45.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25414",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.363",
"lastModified": "2025-01-13T14:34:53.770",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T19:15:45.353",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-12T03:15:32.770",
"lastModified": "2025-03-13T20:15:18.100",
"lastModified": "2025-03-14T19:15:45.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-754"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25743",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T18:15:10.837",
"lastModified": "2024-11-21T09:01:19.430",
"lastModified": "2025-03-14T19:15:45.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26581",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T13:15:09.020",
"lastModified": "2024-11-21T09:02:34.970",
"vulnStatus": "Modified",
"lastModified": "2025-03-14T19:10:02.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -82,6 +82,21 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
},
{
"nodes": [
{
@ -91,43 +106,44 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.262",
"versionEndExcluding": "5.4.269",
"matchCriteriaId": "48E561A5-2F59-4E74-BFAB-39B8D844FD15"
"matchCriteriaId": "8108978F-ACC3-4DC3-AEC9-E893E980D84A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionStartIncluding": "5.10.190",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "B39742A2-A0C1-490C-95CC-FB78D6D70698"
"matchCriteriaId": "7A162229-E85C-4150-B585-B402CAB87544"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionStartIncluding": "5.15.124",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "E6FB1C44-BEEE-4D31-AD44-E15806EA6249"
"matchCriteriaId": "9396F7D9-F665-4C88-A7EF-4C6AC603DC2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionStartIncluding": "6.1.43",
"versionEndExcluding": "6.1.78",
"matchCriteriaId": "5ED93437-2DAD-459B-8B46-01C911BDE283"
"matchCriteriaId": "C967F956-2F5A-47ED-BA7B-6868144DD907"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionStartIncluding": "6.4.8",
"versionEndExcluding": "6.6.17",
"matchCriteriaId": "9B4E27C1-FDA4-443A-8088-7D297EB2997B"
"matchCriteriaId": "78C64F80-8402-4CC8-ABFA-E775538A6F24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.5",
"matchCriteriaId": "06B690E0-5DAC-44EC-947A-D6E4EB0475CA"
"matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3"
}
]
}
@ -186,7 +202,10 @@
},
{
"url": "https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8",
@ -239,11 +258,18 @@
},
{
"url": "https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2609",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-19T12:15:08.910",
"lastModified": "2024-11-21T09:10:07.003",
"lastModified": "2025-03-14T20:15:12.933",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-356"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866100",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27798",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:03.593",
"lastModified": "2024-12-09T19:21:45.187",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T19:15:45.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27872",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:10.557",
"lastModified": "2025-03-13T20:15:19.147",
"lastModified": "2025-03-14T19:15:46.177",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31331",
"sourceIdentifier": "security@android.com",
"published": "2024-07-09T21:15:13.883",
"lastModified": "2024-12-17T19:02:46.887",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-14T19:15:46.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-783"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37289",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-06-10T22:15:12.893",
"lastModified": "2024-11-21T09:23:32.847",
"lastModified": "2025-03-14T20:15:13.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://success.trendmicro.com/dcx/s/solution/000298063",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38873",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T07:15:09.110",
"lastModified": "2024-11-21T09:26:54.500",
"lastModified": "2025-03-14T19:15:46.563",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-004",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38909",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T14:15:02.897",
"lastModified": "2024-11-21T09:26:59.560",
"lastModified": "2025-03-14T19:15:46.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "http://elfinder.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40794",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.410",
"lastModified": "2025-03-13T21:15:40.523",
"lastModified": "2025-03-14T19:15:46.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

Some files were not shown because too many files have changed in this diff Show More