mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 18:30:48 +00:00
Auto-Update: 2025-03-14T21:00:20.865366+00:00
This commit is contained in:
parent
2cdca09f5d
commit
367cbdb06d
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-0367",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-06-25T04:00:00.000",
|
||||
"lastModified": "2025-02-07T15:15:09.513",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:07:51.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-0210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-08-06T04:00:00.000",
|
||||
"lastModified": "2025-02-07T15:15:10.580",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:07:41.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-2773",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-09-02T23:03:00.000",
|
||||
"lastModified": "2025-02-07T15:15:11.043",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:07:33.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-5659",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-02-12T19:00:00.000",
|
||||
"lastModified": "2025-02-07T15:15:11.533",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:07:21.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-0655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-02-07T21:00:00.000",
|
||||
"lastModified": "2025-02-07T15:15:11.747",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:07:27.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-3431",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-08-05T19:41:00.000",
|
||||
"lastModified": "2025-02-10T20:15:30.473",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:06:46.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2010-5326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2016-05-13T10:59:00.173",
|
||||
"lastModified": "2025-02-07T14:15:33.713",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:33:36.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2011-1823",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2011-06-09T10:36:27.680",
|
||||
"lastModified": "2025-02-07T15:15:12.017",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:06:36.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2011-4723",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2011-12-20T11:55:08.413",
|
||||
"lastModified": "2025-02-10T20:15:32.090",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:06:23.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2012-1889",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2012-06-13T04:46:46.190",
|
||||
"lastModified": "2025-02-04T19:15:20.240",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:06:09.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-0074",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2013-03-13T00:55:01.137",
|
||||
"lastModified": "2025-02-10T19:15:31.407",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:05:51.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-3896",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2013-10-09T14:53:25.230",
|
||||
"lastModified": "2025-02-10T19:15:32.397",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:16:52.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-5223",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2013-11-19T04:50:12.063",
|
||||
"lastModified": "2025-02-07T15:15:13.867",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:48:19.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-7331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-02-26T14:55:08.520",
|
||||
"lastModified": "2025-02-10T21:15:10.747",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:04.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-0322",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-02-14T16:55:07.500",
|
||||
"lastModified": "2025-02-10T19:15:32.577",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:00.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-1776",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-04-27T10:55:03.340",
|
||||
"lastModified": "2025-02-10T20:15:36.007",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:12.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-2817",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-08-12T21:55:07.007",
|
||||
"lastModified": "2025-02-10T19:15:32.817",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:23.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-3120",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-07-28T19:55:04.490",
|
||||
"lastModified": "2025-02-10T21:15:11.320",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:18.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -100,8 +100,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.1.1",
|
||||
"matchCriteriaId": "B31061F1-66B7-4F12-93CE-685F82BCB17B"
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "985437E6-A916-4359-8EB6-45C35ABA0742"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-4123",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-10-15T10:55:08.037",
|
||||
"lastModified": "2025-02-10T19:15:33.517",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:31.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-1427",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2015-02-17T15:59:04.560",
|
||||
"lastModified": "2025-02-10T19:15:34.320",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:38.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-2590",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2015-07-16T10:59:17.050",
|
||||
"lastModified": "2025-02-10T18:15:23.163",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:33:22.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-4068",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2015-05-29T15:59:23.327",
|
||||
"lastModified": "2025-02-04T21:15:09.290",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:17:45.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-20017",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-10-19T05:15:08.817",
|
||||
"lastModified": "2025-02-03T15:15:10.597",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:00:42.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-1000486",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-01-03T20:29:00.643",
|
||||
"lastModified": "2025-02-07T14:15:41.997",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:05:18.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -156,7 +156,8 @@
|
||||
"url": "https://cryptosense.com/weak-encryption-flaw-in-primefaces/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -187,7 +188,8 @@
|
||||
"url": "https://cryptosense.com/weak-encryption-flaw-in-primefaces/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-11317",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-08-23T17:29:00.177",
|
||||
"lastModified": "2025-02-07T15:15:14.543",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:54:20.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-11357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-08-23T17:29:00.227",
|
||||
"lastModified": "2025-02-07T15:15:14.730",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:05:11.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-6884",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-04-06T17:59:00.163",
|
||||
"lastModified": "2025-02-04T16:15:30.533",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:33:54.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-7269",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-03-27T02:59:00.453",
|
||||
"lastModified": "2025-02-04T21:15:13.193",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:33:44.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,8 +120,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_information_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7C954A7-FF84-4DEB-8728-5B207F374ECC"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_information_services:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B4DF95D-B4B1-4FB6-9D27-A6D359EEACFA"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-8291",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-04-27T01:59:02.057",
|
||||
"lastModified": "2025-02-04T21:15:13.427",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:34:14.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-9248",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-07-03T19:29:00.270",
|
||||
"lastModified": "2025-02-07T15:15:14.937",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:05:03.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-11138",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-05-31T18:29:00.557",
|
||||
"lastModified": "2025-02-07T17:15:10.807",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:06:53.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-1273",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2018-04-11T13:29:00.290",
|
||||
"lastModified": "2025-02-07T13:15:24.193",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:54:07.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -101,11 +101,11 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-14847",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-08-02T07:29:00.280",
|
||||
"lastModified": "2025-02-04T21:15:14.093",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:06:59.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -152,7 +152,8 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -211,7 +212,8 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-25099",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T05:15:06.007",
|
||||
"lastModified": "2024-11-21T04:03:33.547",
|
||||
"lastModified": "2025-03-14T19:15:38.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DCIT/perl-CryptX/issues/47",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-6789",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-02-08T23:29:01.170",
|
||||
"lastModified": "2025-02-07T14:15:44.870",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:05:26.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-6882",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-27T16:29:00.530",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:05:57.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -182,14 +182,16 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
"VDB Entry",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=108786",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -227,14 +229,16 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
"VDB Entry",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=108786",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-7600",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2018-03-29T07:29:00.260",
|
||||
"lastModified": "2025-02-07T13:15:24.433",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:50:41.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -180,7 +180,8 @@
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
"VDB Entry",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -188,14 +189,16 @@
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
"VDB Entry",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://badpackets.net/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018-7600/",
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -225,7 +228,8 @@
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -254,21 +258,24 @@
|
||||
"url": "https://twitter.com/RicterZ/status/979567469726613504",
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/RicterZ/status/984495201354854401",
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/arancaytar/status/979090719003627521",
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -331,7 +338,8 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
"VDB Entry",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -339,14 +347,16 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
"VDB Entry",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://badpackets.net/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018-7600/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -376,7 +386,8 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -405,21 +416,24 @@
|
||||
"url": "https://twitter.com/RicterZ/status/979567469726613504",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/RicterZ/status/984495201354854401",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/arancaytar/status/979090719003627521",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-7602",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2018-07-19T17:29:00.373",
|
||||
"lastModified": "2025-02-07T13:15:24.790",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:50:35.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-9276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-07-02T16:29:00.600",
|
||||
"lastModified": "2025-02-05T02:00:01.767",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:39:51.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-12481",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-30T23:29:00.267",
|
||||
"lastModified": "2024-11-21T04:22:56.877",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:08:51.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
@ -85,8 +85,25 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.6.1",
|
||||
"versionEndIncluding": "0.7.1",
|
||||
"matchCriteriaId": "63796DE5-6E54-4005-A4B6-DF86C592E08A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,7 +121,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/1249",
|
||||
@ -116,7 +137,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-12482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-30T23:29:00.313",
|
||||
"lastModified": "2024-11-21T04:22:57.010",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:09:03.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
@ -85,8 +85,25 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E"
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.6.1",
|
||||
"versionEndIncluding": "0.7.1",
|
||||
"matchCriteriaId": "63796DE5-6E54-4005-A4B6-DF86C592E08A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,7 +121,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/1249",
|
||||
@ -116,7 +137,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-12483",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-30T23:29:00.343",
|
||||
"lastModified": "2024-11-21T04:22:57.150",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:09:12.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
@ -85,8 +85,25 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E"
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "0.6.1",
|
||||
"versionEndIncluding": "0.7.1",
|
||||
"matchCriteriaId": "63796DE5-6E54-4005-A4B6-DF86C592E08A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,7 +121,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/1249",
|
||||
@ -116,7 +137,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-13608",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-08-29T19:15:13.227",
|
||||
"lastModified": "2025-02-04T20:15:32.543",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:39:08.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,8 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -36,15 +36,13 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-18988",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-02-07T16:15:10.033",
|
||||
"lastModified": "2025-02-04T21:15:18.430",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:50:21.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -140,7 +140,8 @@
|
||||
"url": "https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?threadtype=label&labels=Security",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -169,7 +170,8 @@
|
||||
"url": "https://community.teamviewer.com/t5/Knowledge-Base/tkb-p/Knowledgebase?threadtype=label&labels=Security",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20500",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-05T15:15:11.253",
|
||||
"lastModified": "2025-02-04T21:15:19.090",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:50:11.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-25211",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-29T00:15:02.107",
|
||||
"lastModified": "2024-11-21T04:40:00.980",
|
||||
"lastModified": "2025-03-14T19:15:39.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-10221",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-08T22:15:11.120",
|
||||
"lastModified": "2025-02-04T20:15:34.620",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:38:55.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-10987",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-07-13T19:15:12.207",
|
||||
"lastModified": "2025-02-04T20:15:34.827",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:38:42.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-13671",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2020-11-20T16:15:15.433",
|
||||
"lastModified": "2025-02-07T13:15:28.997",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:50:29.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-7961",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-03-20T19:15:12.737",
|
||||
"lastModified": "2025-02-04T20:15:39.207",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:38:00.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,8 +120,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*",
|
||||
"versionEndIncluding": "7.2.0",
|
||||
"matchCriteriaId": "484E2316-EBD8-4CB8-B867-ADADA119957C"
|
||||
"versionEndExcluding": "7.2.1",
|
||||
"matchCriteriaId": "B8EDC50D-2FE2-4895-8B8A-E869D194162F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -156,7 +156,8 @@
|
||||
"url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -194,7 +195,8 @@
|
||||
"url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Vendor Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-27104",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-02-16T21:15:13.280",
|
||||
"lastModified": "2025-02-03T15:15:13.040",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:48:03.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,7 +133,8 @@
|
||||
"url": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27104.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -148,7 +149,8 @@
|
||||
"url": "https://github.com/accellion/CVEs/blob/main/CVE-2021-27104.txt",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46989",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-28T09:15:37.687",
|
||||
"lastModified": "2024-11-21T06:35:08.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-14T19:02:38.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,54 +39,154 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19",
|
||||
"versionEndExcluding": "4.19.191",
|
||||
"matchCriteriaId": "64B18B0C-5B02-4506-ADE4-6B1430542B99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.120",
|
||||
"matchCriteriaId": "2BDC71CF-4451-4D53-93E9-61DE7C4E25B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.38",
|
||||
"matchCriteriaId": "2BB4E5E8-4AAD-475A-A1B9-F287254C7D72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.11.22",
|
||||
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.12.5",
|
||||
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-26143",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-03-10T17:47:32.813",
|
||||
"lastModified": "2025-01-29T17:15:17.873",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:00:05.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -175,7 +175,8 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -231,7 +232,8 @@
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
"Third Party Advisory",
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-26318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-03-04T18:15:08.367",
|
||||
"lastModified": "2025-01-29T17:15:18.433",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:59:55.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-29499",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-04-26T02:15:37.107",
|
||||
"lastModified": "2025-01-29T17:15:19.870",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:00:30.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-31199",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-08T01:15:09.767",
|
||||
"lastModified": "2025-02-03T15:15:14.033",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:47:20.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3598",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2022-10-21T16:15:11.030",
|
||||
"lastModified": "2024-11-21T07:19:50.973",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:10:12.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -81,8 +81,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.9.0",
|
||||
"versionEndIncluding": "4.4.0",
|
||||
"matchCriteriaId": "6E0B7DC1-7265-4D0F-9400-1559C3378D18"
|
||||
"matchCriteriaId": "13FB78A9-3D60-41C4-9245-812E2695017D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-44877",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-05T23:15:09.150",
|
||||
"lastModified": "2025-01-29T16:15:31.253",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:00:50.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45677",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T14:15:13.667",
|
||||
"lastModified": "2024-11-21T07:29:35.210",
|
||||
"lastModified": "2025-03-14T19:15:39.943",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-489"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46637",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T21:15:10.890",
|
||||
"lastModified": "2024-11-21T07:30:50.047",
|
||||
"lastModified": "2025-03-14T19:15:40.160",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4785",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-21T09:15:11.603",
|
||||
"lastModified": "2024-11-21T07:35:56.280",
|
||||
"lastModified": "2025-03-14T19:15:40.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48340",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T02:15:10.217",
|
||||
"lastModified": "2024-11-21T07:33:12.410",
|
||||
"lastModified": "2025-03-14T19:15:40.370",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49187",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:00:55.803",
|
||||
"lastModified": "2025-02-26T07:00:55.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-14T20:57:56.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: Arreglar clk_hw_get_clk() cuando dev es NULL Cualquier estructura clk_core registrada puede tener un puntero NULL en su campo dev. Si bien nunca se document\u00f3 realmente, esto se evidencia por el amplio uso de clk_register y clk_hw_register con un puntero de dispositivo NULL, y el hecho de que la funci\u00f3n principal of_clk_hw_register() tambi\u00e9n pasa un puntero de dispositivo NULL. Una llamada a clk_hw_get_clk() en una estructura clk_hw cuyo clk_core est\u00e1 en ese caso dar\u00e1 como resultado una desreferencia de puntero NULL cuando llame a dev_name() en ese puntero de dispositivo NULL. Agregue una prueba para este caso y use NULL como dev_id si el puntero del dispositivo es NULL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.33",
|
||||
"matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.19",
|
||||
"matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.17",
|
||||
"versionEndExcluding": "5.17.2",
|
||||
"matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c1b56df451716ba207bbf59f303473643eee4fd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23f89fe005b105f0dcc55034c13eb89f9b570fac",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4be3e4c05d8dd1b83b75652cad88c9e752ec7054",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d183f20cf5a7b546d4108e796b98210ceb317579",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0271",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-21T09:15:12.187",
|
||||
"lastModified": "2024-11-21T07:36:52.207",
|
||||
"lastModified": "2025-03-14T19:15:40.723",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0380",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-21T09:15:12.673",
|
||||
"lastModified": "2024-11-21T07:37:04.923",
|
||||
"lastModified": "2025-03-14T19:15:40.897",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0559",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-21T09:15:13.330",
|
||||
"lastModified": "2024-11-21T07:37:24.097",
|
||||
"lastModified": "2025-03-14T19:15:41.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22952",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-11T09:15:08.787",
|
||||
"lastModified": "2025-01-29T16:15:35.047",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:00:58.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24080",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T23:15:11.543",
|
||||
"lastModified": "2024-11-21T07:47:22.647",
|
||||
"lastModified": "2025-03-14T19:15:41.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24081",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T23:15:11.600",
|
||||
"lastModified": "2024-11-21T07:47:22.790",
|
||||
"lastModified": "2025-03-14T19:15:41.457",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24184",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T15:15:12.197",
|
||||
"lastModified": "2024-11-21T07:47:32.760",
|
||||
"lastModified": "2025-03-14T19:15:41.630",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26249",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T02:15:10.293",
|
||||
"lastModified": "2024-11-21T07:50:58.890",
|
||||
"lastModified": "2025-03-14T19:15:41.807",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26253",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T02:15:10.367",
|
||||
"lastModified": "2024-11-21T07:50:59.030",
|
||||
"lastModified": "2025-03-14T19:15:41.997",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26265",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T04:15:10.637",
|
||||
"lastModified": "2024-11-21T07:51:00.530",
|
||||
"lastModified": "2025-03-14T19:15:42.207",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26266",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T04:15:10.693",
|
||||
"lastModified": "2024-11-21T07:51:00.667",
|
||||
"lastModified": "2025-03-14T19:15:42.750",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26267",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-21T09:15:13.597",
|
||||
"lastModified": "2024-11-21T07:51:00.803",
|
||||
"lastModified": "2025-03-14T19:15:43.007",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-15T23:15:10.070",
|
||||
"lastModified": "2025-02-10T19:15:36.877",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T20:01:09.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30774",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-19T15:15:08.923",
|
||||
"lastModified": "2024-11-21T08:00:52.747",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:09:26.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -66,8 +66,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13A056CA-3182-4568-9318-3982E02D671C"
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.5.1",
|
||||
"versionEndIncluding": "4.4.0",
|
||||
"matchCriteriaId": "E05D8B0C-6AE1-497D-96BF-374E0D63321A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37057",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-17T21:15:50.380",
|
||||
"lastModified": "2024-11-21T08:11:00.917",
|
||||
"lastModified": "2025-03-14T20:15:12.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jlink.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-25T17:15:03.553",
|
||||
"lastModified": "2024-09-11T18:07:49.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-14T20:15:12.273",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-7233",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-02-12T16:15:08.390",
|
||||
"lastModified": "2024-11-21T08:45:34.233",
|
||||
"lastModified": "2025-03-14T19:15:43.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7261",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-06-07T20:15:10.887",
|
||||
"lastModified": "2024-12-26T16:07:39.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-14T20:15:12.477",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-233"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1694",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-06-07T20:15:10.973",
|
||||
"lastModified": "2024-12-26T16:09:24.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-14T19:15:43.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-474"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21137",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:14.437",
|
||||
"lastModified": "2024-11-21T08:53:51.363",
|
||||
"lastModified": "2025-03-14T19:15:43.810",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21159",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:18.517",
|
||||
"lastModified": "2024-11-21T08:53:53.920",
|
||||
"lastModified": "2025-03-14T19:15:44.500",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21179",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:22.090",
|
||||
"lastModified": "2024-11-21T08:53:56.313",
|
||||
"lastModified": "2025-03-14T20:15:12.770",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22020",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-07-09T02:15:09.973",
|
||||
"lastModified": "2024-11-22T12:15:18.453",
|
||||
"lastModified": "2025-03-14T19:15:44.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22280",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-07-11T05:15:10.123",
|
||||
"lastModified": "2024-11-21T08:55:57.290",
|
||||
"lastModified": "2025-03-14T19:15:44.857",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25226",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-14T15:15:09.767",
|
||||
"lastModified": "2024-11-21T09:00:30.627",
|
||||
"lastModified": "2025-03-14T19:15:45.037",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25414",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-16T02:15:51.363",
|
||||
"lastModified": "2025-01-13T14:34:53.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-14T19:15:45.353",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-12T03:15:32.770",
|
||||
"lastModified": "2025-03-13T20:15:18.100",
|
||||
"lastModified": "2025-03-14T19:15:45.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-15T18:15:10.837",
|
||||
"lastModified": "2024-11-21T09:01:19.430",
|
||||
"lastModified": "2025-03-14T19:15:45.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26581",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-20T13:15:09.020",
|
||||
"lastModified": "2024-11-21T09:02:34.970",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-14T19:10:02.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -82,6 +82,21 @@
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
@ -91,43 +106,44 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.262",
|
||||
"versionEndExcluding": "5.4.269",
|
||||
"matchCriteriaId": "48E561A5-2F59-4E74-BFAB-39B8D844FD15"
|
||||
"matchCriteriaId": "8108978F-ACC3-4DC3-AEC9-E893E980D84A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5.0",
|
||||
"versionStartIncluding": "5.10.190",
|
||||
"versionEndExcluding": "5.10.210",
|
||||
"matchCriteriaId": "B39742A2-A0C1-490C-95CC-FB78D6D70698"
|
||||
"matchCriteriaId": "7A162229-E85C-4150-B585-B402CAB87544"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11.0",
|
||||
"versionStartIncluding": "5.15.124",
|
||||
"versionEndExcluding": "5.15.149",
|
||||
"matchCriteriaId": "E6FB1C44-BEEE-4D31-AD44-E15806EA6249"
|
||||
"matchCriteriaId": "9396F7D9-F665-4C88-A7EF-4C6AC603DC2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16.0",
|
||||
"versionStartIncluding": "6.1.43",
|
||||
"versionEndExcluding": "6.1.78",
|
||||
"matchCriteriaId": "5ED93437-2DAD-459B-8B46-01C911BDE283"
|
||||
"matchCriteriaId": "C967F956-2F5A-47ED-BA7B-6868144DD907"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2.0",
|
||||
"versionStartIncluding": "6.4.8",
|
||||
"versionEndExcluding": "6.6.17",
|
||||
"matchCriteriaId": "9B4E27C1-FDA4-443A-8088-7D297EB2997B"
|
||||
"matchCriteriaId": "78C64F80-8402-4CC8-ABFA-E775538A6F24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.0",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.5",
|
||||
"matchCriteriaId": "06B690E0-5DAC-44EC-947A-D6E4EB0475CA"
|
||||
"matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -186,7 +202,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8",
|
||||
@ -239,11 +258,18 @@
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2609",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-19T12:15:08.910",
|
||||
"lastModified": "2024-11-21T09:10:07.003",
|
||||
"lastModified": "2025-03-14T20:15:12.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-356"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866100",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27798",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:03.593",
|
||||
"lastModified": "2024-12-09T19:21:45.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-14T19:15:45.967",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27872",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.557",
|
||||
"lastModified": "2025-03-13T20:15:19.147",
|
||||
"lastModified": "2025-03-14T19:15:46.177",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-61"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31331",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-07-09T21:15:13.883",
|
||||
"lastModified": "2024-12-17T19:02:46.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-14T19:15:46.363",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-783"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37289",
|
||||
"sourceIdentifier": "security@trendmicro.com",
|
||||
"published": "2024-06-10T22:15:12.893",
|
||||
"lastModified": "2024-11-21T09:23:32.847",
|
||||
"lastModified": "2025-03-14T20:15:13.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://success.trendmicro.com/dcx/s/solution/000298063",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38873",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-21T07:15:09.110",
|
||||
"lastModified": "2024-11-21T09:26:54.500",
|
||||
"lastModified": "2025-03-14T19:15:46.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-004",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T14:15:02.897",
|
||||
"lastModified": "2024-11-21T09:26:59.560",
|
||||
"lastModified": "2025-03-14T19:15:46.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://elfinder.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40794",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:12.410",
|
||||
"lastModified": "2025-03-13T21:15:40.523",
|
||||
"lastModified": "2025-03-14T19:15:46.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user