mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-02-02T15:00:24.769821+00:00
This commit is contained in:
parent
958b92db71
commit
3d070a0e04
@ -2,9 +2,9 @@
|
||||
"id": "CVE-2003-0899",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-11-03T05:00:00.000",
|
||||
"lastModified": "2017-07-11T01:29:38.040",
|
||||
"vulnStatus": "Modified",
|
||||
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nAcme Labs, thttpd, 2.24",
|
||||
"lastModified": "2024-02-02T14:01:01.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"evaluatorSolution": "This vulnerability is addressed in the following product release:\nAcme Labs, thttpd, 2.24",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -49,7 +71,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -63,23 +85,20 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acme_labs:thttpd:2.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3A5BDDC-EF56-432E-A481-2AAABAAC08DF"
|
||||
"criteria": "cpe:2.3:a:acme:thttpd:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.21",
|
||||
"versionEndExcluding": "2.23",
|
||||
"matchCriteriaId": "7F368CAF-B770-4657-81D2-69D9A678F3D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acme_labs:thttpd:2.21b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AC6999F-54B3-45D0-A089-018BB469A03E"
|
||||
"criteria": "cpe:2.3:a:acme:thttpd:2.23:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1059FC0B-2461-4032-BB11-D21598AECCCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acme_labs:thttpd:2.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50974958-D5C1-418D-990F-331E26DB03DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:acme_labs:thttpd:2.23b1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0058B7F6-FD3B-4CAA-BCA8-2218390DA18C"
|
||||
"criteria": "cpe:2.3:a:acme:thttpd:2.23:b1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8F2CDC4-B206-4D8B-8F11-51FA22AD49E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -89,23 +108,60 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=106729188224252&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/10092",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/2729",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/8906",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch"
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.texonet.com/advisories/TEXONET-20030908.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13530",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2003/dsa-396",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2003-1564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-12-31T05:00:00.000",
|
||||
"lastModified": "2008-10-24T04:30:02.847",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:10:59.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-189"
|
||||
"value": "CWE-776"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,403 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2524F0A-AC51-44CB-A4ED-09B70C7E19A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "569432A3-3145-40CD-BFA8-6B70BE47F3E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9635F852-0577-45F6-A301-8DF8108860A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2E409CD-F17C-4A1F-8F84-5E495B2D4652"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E08C8CA8-9F4E-4591-9DDC-C1102F691647"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E973C066-2745-49B5-9FDA-CCD6CE0633B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8070C75-15A8-4A9D-AA0F-4D92CC2691ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6EDF7C8-50C8-4A20-975E-06B2D528E2B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE252FCD-647B-4586-A8EC-6BB095BB3E95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5291EC59-4016-40B3-BF08-292080D19243"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A84CCC4-6F7E-4563-AE45-AF6B45A7D1B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2E74FC5-77EE-42A9-B2F7-6C4FC2F0CD20"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FADFC1E5-2F83-484B-852B-D71B7D1C5A80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2779B6F-AA9F-4D2D-9DD1-9BC9A9042DD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B172A659-DC83-483D-8DBE-637E89DF3DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3FD4D7C-1826-4BC9-BCEA-6FB8D7738D51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52800CB4-6389-4AB0-A098-8F465CF4A733"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D499267-5C14-4888-92C7-2ECE909BD9F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "586C0FAB-E288-4EFB-8946-4535971F23F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15236DDC-0095-4253-9113-61F76EFC0769"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98F95AB1-D3D0-4E39-B135-4B55991845CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "392E4AA7-00D2-45B1-9FA7-C1C7C37431F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7839A86-59AA-400C-BF29-18E612B8EB4D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F9A211A-5C44-4BDC-9676-3B7B937835B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BECA085A-BEF1-4AD2-ABBA-069CE2642796"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E66BF7BC-5B5C-40BB-B826-3CC9DBAB53D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F330D609-31EB-4B4C-B007-ACEABA557F54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D9E2F05B-B298-489C-9E44-62E0A199E148"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "070B2F1F-9A99-4A20-9BA9-CF175D482DA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25DC5AE4-9DEA-4828-96F0-57BACB6C9B25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDE26E6D-53FF-4001-8F25-C112635CB74E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1210A8D-5359-4FD4-963F-506200AA20AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA748E50-798F-40EA-B252-0A166DEEB120"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5B9E7CC-D552-4C9A-909E-42D375452E09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06C20B5C-16E7-4C1B-A2DB-8EB4B9A7045D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7A901B3-B0F4-4D2B-8CAF-25938219B657"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12FCBA01-D739-4BA2-83F5-D41A6DF91F1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFC8C43D-84C7-4C0C-8DD1-66206D665C35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E60C1B4-BBC1-4E2B-8323-A7E059EF6BEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B677850-4FE9-4522-ADAE-42C5D17D4A7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BB7931B-55AA-4735-8AAB-9F3A9E9C0123"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4A5B9AF-7F82-4EEC-A776-587C6DD44448"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94D33392-DD5C-4704-BECF-69D416F9F2C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1BA896F-07D7-4B93-939B-B6CDD1DCA87C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "647CA5AD-5AC2-448E-8445-62837F413361"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37D4241B-A328-45F0-9FAB-CEE20DC7432E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAAD77C4-84EC-4924-90F8-35A2375AA6A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A124C5A-C72C-4623-925E-378FF40671EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8ACD2FD4-E884-4FC5-842B-86AAE06D9E05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14A9036D-1474-4097-9E70-09F7BBA2826C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8884CF6-2F5B-465F-841B-3C69EC3BE3BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A699B966-3756-4D5B-8693-0678EEDD8AD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1E50FED-4BAD-4D04-98C3-C2427E086C1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70880522-BBC0-4D5C-8DA3-245E189FA1C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A8BA1A0-F8E7-4B93-B667-D012C91F831E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27662848-9CD5-43BC-9A1B-8C6EBACCCC21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C967E50C-E7AA-49D0-A055-20CA083CA232"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA398ACA-73C2-4093-AD35-E30161C96C25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "757B5A74-6B7B-4F01-9891-9F9E510074C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C10CC4C-3A9C-4AD0-A7C1-ACF781BF20D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E67FD94-4E96-4FCC-990B-4C0A5C599ED0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E7DDE27-9DE8-4E45-AFA2-AFFEA8F0D917"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92CEEDA7-5DFC-4DB0-989E-F356E5CF65A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25D60B58-3558-4244-A5B3-8D16F53A9588"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5DB409B-795F-4F8A-85E1-0B4E66AE9D48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "457C47ED-A429-42AE-9FF9-978D605BACFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C20B9D5-9E10-4B6D-8095-B2A63EDB8D16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9087E4FE-661F-4803-BB3B-09D2699265E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C2D01CF-9FCE-41F8-997E-EA9BDCCD8C76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84E1C7A6-DCA7-4760-B1B6-EFB256978CFC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F1E7CFF-E4B3-4B31-BE23-C187544E9488"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81EDD077-5183-4588-8DB1-93A0597AAA34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "530FE28C-0D51-4BF9-AE43-D65F9913B48B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F030053E-2292-42E2-8435-0CFBDDE688DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0258377-DD8B-4FA6-B075-E8489C83CEAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69E0BD23-38C6-43C0-870F-00B13F7C91D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3D3350E-5186-4DC8-9D1B-59068A469496"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F76783D0-63F8-48A7-85FE-E5E8DBFA223D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52AE89B2-C1A3-48C8-AEB5-4B0D757AE361"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8ACA170D-21DB-47CD-AD73-2DEB2A2439F1"
|
||||
"criteria": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.5.0",
|
||||
"matchCriteriaId": "FFC0B453-3262-463A-9748-EC2863D58401"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -464,23 +92,46 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://mail.gnome.org/archives/xml/2008-August/msg00034.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/31868",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.reddit.com/r/programming/comments/65843/time_to_upgrade_libxml2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0886.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.stylusstudio.com/xmldev/200302/post20020.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://xmlsoft.org/news.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-0747",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-10-20T04:00:00.000",
|
||||
"lastModified": "2023-11-07T01:56:45.173",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:03:04.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -22,6 +22,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -55,7 +77,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -84,6 +106,7 @@
|
||||
"url": "http://secunia.com/advisories/12540",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
@ -91,6 +114,7 @@
|
||||
"url": "http://secunia.com/advisories/34920",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
@ -143,6 +167,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-463.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -157,6 +182,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1233",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
@ -170,60 +196,113 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-1363",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-08-04T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:30:57.933",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:01:06.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -118,8 +140,43 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:collaboration_suite:release_1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D1A1DC8-A38C-4061-A825-C6CC2ED453E0"
|
||||
"criteria": "cpe:2.3:a:oracle:collaboration_suite:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F72FA3A-068D-4DC8-84DF-A86FDA7CAE1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:8.1.7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B559C62F-88A7-42D3-9629-9F5CAD43F8B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:9.0.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2109201B-89F7-4FF2-BFD1-2B220E3146FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6C67572-800C-4214-AD12-E9017A9A5BAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:9.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E108197C-DCA8-4624-9FEF-621BFB299662"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C63EC8-73D7-46AE-81E7-04DF212BC8B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:9.2.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47CC3066-82BA-41AB-B6C8-D2E7D7AE7D6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:database_server:10.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "553BAC35-0A37-40C2-A150-F34D59D097F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -185,311 +242,6 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "016AFE8B-049D-4BA9-9270-E18DFDFDC61F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle10g:enterprise_9.0.4_.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF667575-AD5F-43D6-B7BF-F255C1A14A0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C033CC3-1840-49A1-AB6E-3EC8CE1F0BEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle10g:personal_9.0.4_.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CEA97EC-FC86-4F53-A134-B98F25892BB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle10g:personal_10.1_.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E41C0DB6-CD92-4FDC-A705-83CFB92C062A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle10g:standard_9.0.4_.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACC43855-2664-42CC-87DD-3C90DB1430C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle10g:standard_10.1_.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25A4D091-1D89-484E-A3F7-0F98F8814686"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.0.5_.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D96A60B5-7B83-4E94-AF2B-AF3DF28EE1D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C5C8D47-953E-41DF-9852-955611F6D387"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.0.6_.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4798CAE-9AAA-4623-85B2-309DB46DD28A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "121CF7A1-1710-4DA1-B7B6-028557D3FA49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "616AD7A7-C8F3-4125-8E26-64109EA40730"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.5_.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C7365AA-ACDA-461A-A84C-6B4FF04F295F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "42C22E50-FDB8-4314-9F36-70D0130EAA6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.6_.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C65AC14-2AA0-4475-9932-E4AEA410CBCD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA730ABB-F315-4F7F-B820-33C5558B05DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4CE4E08-4892-419D-AC51-68DD42073092"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:enterprise_8.1.7_.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF52682E-0AB7-4C3F-94D4-7B4A7E08F2C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C65C2671-2FFE-4461-A570-72E3BBC312D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.0.6_.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA59E72F-ACC1-44F3-AE63-B42F1EB83F3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5CB4061-855C-4DAA-BDAD-AA1E68EFC1E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07F81AC9-DEBD-4B04-8753-C68BAE509B13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0785C55D-183D-42D8-A9F9-DBD297FE7F43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8086BBDC-76BE-47C0-8F11-CEC57A23FC27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72BAAEF7-74CA-4C4F-8D52-AC4D5DE2E0E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle8i:standard_8.1.7_.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EECAE774-22F3-4872-9E05-A14376F3883D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:client_9.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFAA7E8B-263B-40A2-B6D8-8A303A7D4358"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:client_9.2.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "085FF0CB-B426-4DCB-9411-017A45280A60"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED4991B9-67A9-4EE9-A30F-27950BF3A3DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2201796B-013B-4440-B366-1F2966AA86FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43C6FFA8-18A6-4EE1-BE10-A1B7F3C1A47E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.0.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F90F6C4F-CEF5-4172-97FC-617B71EAA636"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FFA2A5C-B289-4505-85F5-7F6F0222B552"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E876825-D6E5-4958-B737-4CE43A32BEC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8E07567-754A-40C0-9428-D151880EE6F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6233345D-5100-404A-9B61-524D9679D9E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FB739C3-A9BD-433F-8547-12BC615DB18D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7231B057-9B7E-43CA-9E91-6DF74D6ADAE7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4D7A3CB-54CC-4CD9-9672-366233BF0CCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58DB0B6B-EB97-448A-B63E-E5997382DD45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.0.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA77BC6D-661F-46E9-B144-1587C1192B8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.0.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F9C7F3-8140-4FEF-8319-64CE51B830AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68286D06-9EBA-4FBD-AB0B-D80993895416"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C059683-E0A1-4E97-B393-CB6B0EACF7C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5675664-7036-48D0-9524-0350F626D4CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA9F3EE8-DA8B-4605-B70B-CFCA25B07C1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0DE0FB4-3C1A-460D-B48E-11D7AF415A94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:personal_9.2.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "597EE9ED-6A95-46C7-BE83-ADEC6AA65341"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCAD9D1D-A7E5-4D88-B93B-C518BF1986AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E46FE2E-CA1A-4970-81FF-0BFFF2CF6849"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3EE7A2B1-A161-4A20-9EEC-B1EF7F2E387C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D65D66A0-23F7-4110-AF71-05CBFB3F92F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F207CBC6-D186-418D-8F11-3E623530E00B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FB2708A-58D1-4F17-8504-3748D6667788"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E83B1C7A-287A-405F-B44E-85F891183D2E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34FC1E19-8F20-4215-8D90-E42EF7126BD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB172848-A873-4137-A335-AD034806A5EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B78BD7D2-7B48-438C-8C24-01C4007C1A32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DDCC0D1-32AD-4902-8383-2AA169C3F3BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D4D70A8-A6FE-4F82-82F1-AB1E9C28FB35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F64908D-FDAA-499B-8060-8A6EC2443418"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E77BCF6E-0D09-4DAF-B147-D11FEEE7371C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -499,16 +251,23 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=110382345829397&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101782-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/316206",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
@ -516,6 +275,7 @@
|
||||
"url": "http://www.ngssoftware.com/advisories/oracle23122004.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -524,6 +284,7 @@
|
||||
"url": "http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -532,13 +293,17 @@
|
||||
"url": "http://www.securityfocus.com/bid/10871",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA04-245A.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
@ -546,7 +311,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18659",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-3120",
|
||||
"sourceIdentifier": "security@debian.org",
|
||||
"published": "2005-10-17T20:06:00.000",
|
||||
"lastModified": "2018-10-19T15:34:34.783",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:00:54.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -18,6 +18,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -51,7 +73,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,23 +87,29 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_kansas:lynx:2.8.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2DA626DE-D9B2-4764-80AA-7D4F499184F4"
|
||||
"criteria": "cpe:2.3:a:invisible-island:lynx:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.8.6",
|
||||
"matchCriteriaId": "678A8E2F-E386-4534-85A0-DEDC96407237"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_kansas:lynx:2.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6033263D-6B30-4002-B9F5-4062FD09B815"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_kansas:lynx:2.8.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B95B11DF-213D-4CD0-8AFD-8978FF296481"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_kansas:lynx:2.8.6_dev13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "080A2C3A-3842-41E6-9997-AA21E0C36E64"
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -91,97 +119,262 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.47/SCOSA-2005.47.txt",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/038019.html",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17150",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17216",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17230",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17231",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17238",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17248",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17340",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17360",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17444",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17445",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17480",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/18376",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/18584",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/20383",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1015065",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.423056",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-010.htm",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2005/dsa-874",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2005/dsa-876",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2006/dsa-1085",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200510-15.xml",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:186",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openpkg.org/security/OpenPKG-SA-2005.026-lynx.html",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-803.html",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/419763/100/0/threaded",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/435689/30/4740/threaded",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/15117",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170253",
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9257",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/206-1/",
|
||||
"source": "security@debian.org"
|
||||
"source": "security@debian.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-1285",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-03-06T20:19:00.000",
|
||||
"lastModified": "2018-10-30T16:25:35.747",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:03:24.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-674"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,288 +84,112 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BF57C14-86B6-419A-BAFF-93D01CB1E081"
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.4.7",
|
||||
"matchCriteriaId": "1E364C9C-B72A-4010-A112-19EFFBDD7916"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78BAA18C-E5A0-4210-B64B-709BBFF31EEC"
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.2.2",
|
||||
"matchCriteriaId": "91370F42-4EA1-445E-913F-34F473CB1905"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92FB0F1B-80B4-47F9-A54C-51DB7E77CA08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "419867C6-37BE-43B4-BFE0-6325FEE3807D"
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DC9268E-4A06-4494-BE50-A3B806AD4937"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37896E87-95C2-4039-8362-BC03B1C56706"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA1E7EFF-1CCA-473B-8D5C-30D59C26DC70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13A159B4-B847-47DE-B7F8-89384E6C551B"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29184B59-5756-48DB-930C-69D5CD628548"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57B59616-A309-40B4-94B1-50A7BC00E35C"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8667FBC6-04B6-40E5-93B3-6C22BEED4B26"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F9EF63F-DDA3-448B-92D7-27ED92C51FED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F39A1B1-416E-4436-8007-733B66904A14"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "397313C3-6BF5-4A87-90B3-55678E807171"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B8B3138-3DCC-4682-B9A8-920E1110700D"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73322DEE-27A6-4D18-88A3-ED7F9CAEABD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A61204-33CE-422F-8285-20A5E98ADF3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC2E5F96-66D2-4F99-A74D-6A2305EE218E"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2FE6DAA-4702-409A-98B6-DE13B12805A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D724D09-0D45-4701-93C9-348301217C8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E36203C-1392-49BB-AE7E-49626963D673"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.0.7:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE287FF5-53C6-43E6-9FEB-28CD6185EB2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6713614A-B14E-4A85-BF89-ED780068FC68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD95F8EB-B428-4B3C-9254-A5DECE03A989"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "069EB7EE-06B9-454F-9007-8DE5DCA33C53"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18BF5BE6-09EA-45AD-93BF-2BEF1742534E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC1460DF-1687-4314-BF1A-01290B20302D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "470380B0-3982-48FC-871B-C8B43C81900D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4AAF4586-74FF-47C6-864B-656FDF3F33D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5245F990-B4A7-4ED8-909D-B8137CE79FAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5652D5B0-68E4-4239-B9B7-599AFCF4C53E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57B71BB7-5239-4860-9100-8CABC3992D8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3F9DF9D-15E5-4387-ABE3-A7583331A928"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11579E5C-D7CF-46EE-B015-5F4185C174E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C69CDE21-2FD4-4529-8F02-8709CF5E3D7E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "221B9AC4-C63C-4386-B3BD-E4BC102C6124"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B7BA75-2A32-4A8E-ADF8-BCB4FC48CB5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BEA491B-77FD-4760-8F6F-3EBC6BD810D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB25CFBB-347C-479E-8853-F49DD6CBD7D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D2937B3-D034-400E-84F5-33833CE3764D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71AEE8B4-FCF8-483B-8D4C-2E80A02E925E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C2AF1D9-33B6-4B2C-9269-426B6B720164"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84B70263-37AA-4539-A286-12038A3792C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9BF34B5-F74C-4D56-9841-42452D60CB87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zend:engine:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3F2F976-056E-4BB2-97BC-F3C67D2799C6"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B5DCF29-6830-45FF-BC88-17E2249C653D"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -353,115 +199,288 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0154.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2007-0163.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24909",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24910",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24924",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24941",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/24945",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/25445",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26048",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26642",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/27864",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/28936",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200705-19.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://us2.php.net/releases/4_4_7.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://us2.php.net/releases/5_2_2.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:087",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:088",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:089",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:090",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/32769",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.php-security.org/MOPB/MOPB-03-2007.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.php.net/ChangeLog-4.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.php.net/ChangeLog-5.php#5.2.4",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.php.net/releases/4_4_8.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.php.net/releases/5_2_4.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0082.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/22764",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1017771",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-549-2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.rpath.com/browse/RPL-1268",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://launchpad.net/bugs/173043",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11017",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/549-1/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-0599",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2008-05-05T17:20:00.000",
|
||||
"lastModified": "2018-10-15T22:01:59.383",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:52:57.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -22,6 +22,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -55,7 +77,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -70,128 +92,80 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.2.5",
|
||||
"matchCriteriaId": "18255FF5-3F40-483F-85DC-21D9B6B4FE07"
|
||||
"versionEndExcluding": "5.2.6",
|
||||
"matchCriteriaId": "AB713389-B8D4-459B-8DA4-43F9DEB44B8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.5.4",
|
||||
"matchCriteriaId": "468860AA-9D7D-400F-8E53-1100EE8C269B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B881352D-954E-4FC0-9E42-93D02A3F3089"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9BF34B5-F74C-4D56-9841-42452D60CB87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8B97B03-7DA7-4A5F-89B4-E78CAB20DE17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B00B416D-FF23-4C76-8751-26D305F0FA0F"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.5.4",
|
||||
"matchCriteriaId": "190009BB-163F-4D60-AC03-98BECBA13B2D"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -203,111 +177,264 @@
|
||||
"url": "http://cvs.php.net/viewvc.cgi/php-src/sapi/cgi/cgi_main.c?r1=1.267.2.15.2.50.2.12&r2=1.267.2.15.2.50.2.13&diff_format=u",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01476437",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/30048",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/30083",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/30345",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/30616",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/30757",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/30828",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/31200",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/31326",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32746",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/35650",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200811-05.xml",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/147027",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:127",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:128",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2008/05/02/2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.php.net/ChangeLog-5.php",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/492535/100/0/threaded",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/29009",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1019958",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.488951",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/usn-628-1",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1412",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2008/1810/references",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2008/2268",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42137",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.rpath.com/browse/RPL-2503",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5510",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-1955",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-06-08T01:00:00.687",
|
||||
"lastModified": "2023-11-07T02:04:02.727",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:11:43.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-776"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -226,21 +248,21 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=129190899612998&w=2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/34724",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -248,6 +270,7 @@
|
||||
"url": "http://secunia.com/advisories/35284",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -255,6 +278,7 @@
|
||||
"url": "http://secunia.com/advisories/35360",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -262,6 +286,7 @@
|
||||
"url": "http://secunia.com/advisories/35395",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -269,6 +294,7 @@
|
||||
"url": "http://secunia.com/advisories/35444",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -276,6 +302,7 @@
|
||||
"url": "http://secunia.com/advisories/35487",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -283,6 +310,7 @@
|
||||
"url": "http://secunia.com/advisories/35565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -290,6 +318,7 @@
|
||||
"url": "http://secunia.com/advisories/35710",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -297,6 +326,7 @@
|
||||
"url": "http://secunia.com/advisories/35797",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -304,6 +334,7 @@
|
||||
"url": "http://secunia.com/advisories/35843",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -311,6 +342,7 @@
|
||||
"url": "http://secunia.com/advisories/36473",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -318,6 +350,7 @@
|
||||
"url": "http://secunia.com/advisories/37221",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -332,6 +365,7 @@
|
||||
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -346,7 +380,7 @@
|
||||
"url": "http://svn.apache.org/viewvc?view=rev&revision=781403",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -367,6 +401,7 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -374,6 +409,7 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -381,6 +417,7 @@
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -395,6 +432,7 @@
|
||||
"url": "http://www.debian.org/security/2009/dsa-1812",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -402,6 +440,7 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:131",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -409,6 +448,7 @@
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -416,14 +456,14 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2009/06/03/4",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -431,6 +471,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-1107.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -438,6 +479,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2009-1108.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -445,6 +487,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/506053/100/0/threaded",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -453,6 +496,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/35253",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -475,6 +519,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1907",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -482,6 +527,7 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2009/3184",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -489,69 +535,127 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1107",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -559,6 +663,7 @@
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -567,7 +672,6 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
@ -575,21 +679,21 @@
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-25011",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-12-31T20:15:12.570",
|
||||
"lastModified": "2021-01-06T16:34:36.167",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,9 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.6.2",
|
||||
"matchCriteriaId": "D0690FC0-AF64-4668-8F5A-33B92498BC4E"
|
||||
"matchCriteriaId": "D0628336-45B1-4EAF-A12A-D2F1FD5AB06B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-0022",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2020-02-13T15:15:11.780",
|
||||
"lastModified": "2020-05-13T14:15:13.187",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:50:38.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-682"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -105,25 +105,620 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.195\\(c00e74r3p8\\)",
|
||||
"matchCriteriaId": "75056A1A-9008-4A43-989D-5E5899A3994F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5322963-9375-4E4E-8119-895C224003AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.196\\(c185e7r2p4\\)",
|
||||
"matchCriteriaId": "3AAFCC24-8ADA-427B-84FE-1030AC3DE54D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2564E28F-EF08-4381-96D8-58BB7C8C0E0C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.195\\(c00e74r2p8\\)",
|
||||
"matchCriteriaId": "D9682CC9-50CA-45FB-ACE7-20F1D097FE00"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FD3779B-F943-4B7E-BF82-AA4A051D02C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:p_smart_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.193\\(c605e6r1p5t8\\)",
|
||||
"matchCriteriaId": "E28978C4-E7E5-4414-B442-92A4B533BB42"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:p_smart:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64C4DE1A-ACBD-4DCA-8BAD-23AE6DF4025B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:p_smart_2019_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.180\\(c185e3r4p1\\)",
|
||||
"matchCriteriaId": "E07EC714-4635-446B-87C7-CC5EE610B175"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:p_smart_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B141C85-AFD2-4D7C-8B72-A065B3C905F6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.162\\(c00e156r1p4\\)",
|
||||
"matchCriteriaId": "22D5DBA0-EA94-4752-985C-DA7D555D7854"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7492911B-4242-4947-9DED-9F48FC0875CD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.162\\(c00e156r1p4\\)",
|
||||
"matchCriteriaId": "138A6DBD-D3E3-47F8-ADF9-9ABD5C8AD397"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B315FBC-8BF9-4256-80F9-63EFF0806BEB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.190\\(c432e22r2p5\\)",
|
||||
"matchCriteriaId": "4D8897DB-732C-4B72-8A5C-F726805EFFB3"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21EE286C-8111-4F59-8CF1-13C68EA76B21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.195\\(c00e85r2p8\\)",
|
||||
"matchCriteriaId": "67F3CF79-07A3-476D-B30B-90E1852E48CD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DB671DB-CB5B-46E0-B221-722D051184DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.290\\(c185e5r4p1\\)",
|
||||
"matchCriteriaId": "AD39CEB3-C282-4988-A642-58E41C8DDDED"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:y6_pro_2019_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.290\\(c636e5r3p1\\)",
|
||||
"matchCriteriaId": "CB0C0A35-FBB5-4492-BA94-4ADB1CE29C5E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:y6_pro_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B1F9660-41E0-4536-8032-57AD3E844A94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.264\\(c185e2r5p1t8\\)",
|
||||
"matchCriteriaId": "B9C331EF-4B78-4ECB-A99E-33FDE093ABEB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F48ABE15-BC87-4B02-8B39-94DA1DC96B92"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.338\\(c00e333r1p1t8\\)",
|
||||
"matchCriteriaId": "0F27CB3A-F773-48FB-9CAE-20FC93273D21"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF68FFB0-01F8-4937-8BF4-36866F02E9A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:nova_lite_3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.322\\(c635e8r2p2\\)",
|
||||
"matchCriteriaId": "0938EC8C-17BB-48DE-A477-770948A20696"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EEA4B63-97F3-4BAB-B96E-4C36D9B0FDE5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "9.1.0.291\\(c185e3r4p1\\)",
|
||||
"matchCriteriaId": "2128BDE5-AE3B-427E-8A25-F3065850206A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.183\\(c185e2r6p1\\)",
|
||||
"matchCriteriaId": "174DF865-A0F6-49DE-A465-9BA68799480A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7635502-0FD1-464E-8C64-1E8FF6235495"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.195\\(c636e3r4p3\\)",
|
||||
"matchCriteriaId": "AA8F4F9C-B02E-4C43-B4C4-485E2E38D3B0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_30_pro_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.203\\(c00e202r7p2\\)",
|
||||
"matchCriteriaId": "1D0ECA4E-CAFE-4637-95DC-B201B9549FC0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_30_pro:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "488781A7-935E-4DD6-AD9D-A058067E10AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_30_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.203\\(c00e202r7p2\\)",
|
||||
"matchCriteriaId": "F108CFD3-6A5F-40DE-A042-4528C43317D7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40B08C1D-444B-4C8B-B7F9-60CA9B2A8D50"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_30_pro_5g_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.203\\(c00e202r7p2\\)",
|
||||
"matchCriteriaId": "BD56816C-6906-42DA-9BD3-70810C3BF658"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_30_pro_5g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7D6F9EF-ECC4-43BC-8AF4-BBAAF0F6940B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:mate_30_5g_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.0.203\\(c00e202r7p2\\)",
|
||||
"matchCriteriaId": "20D00959-B094-47B9-868B-21E905EF4401"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:mate_30_5g:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF4BEDDB-BDB9-4172-8B3E-6013AFDD8928"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Feb/10",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2020-02-01",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2020-24681",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-02-02T07:15:07.333",
|
||||
"lastModified": "2024-02-02T07:15:07.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in B&R Industrial Automation Automation Studio allows Privilege Escalation.This issue affects Automation Studio: from 4.6.0 through 4.6.X, from 4.7.0 before 4.7.7 SP, from 4.8.0 before 4.8.6 SP, from 4.9.0 before 4.9.4 SP.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La asignaci\u00f3n de permisos incorrecta para la vulnerabilidad de recursos cr\u00edticos en B&R Industrial Automation Automation Studio permite la escalada de privilegios. Este problema afecta a Automation Studio: desde 4.6.0 hasta 4.6.X, desde 4.7.0 antes de 4.7.7 SP, desde 4.8.0 antes de 4.8.6 SP, desde 4.9.0 anterior a 4.9.4 SP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-24682",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-02-02T08:15:45.573",
|
||||
"lastModified": "2024-02-02T12:15:48.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-22281",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-02-02T08:15:46.013",
|
||||
"lastModified": "2024-02-02T12:15:48.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-22282",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-02-02T07:15:08.287",
|
||||
"lastModified": "2024-02-02T09:15:37.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-22942",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2021-10-18T13:15:09.323",
|
||||
"lastModified": "2023-03-14T08:15:12.127",
|
||||
"lastModified": "2024-02-02T14:15:53.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,6 +121,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0005/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released/",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2002",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-26T17:15:14.113",
|
||||
"lastModified": "2023-12-08T20:48:30.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T14:15:53.510",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -111,6 +111,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0004/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5480",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21780",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:19.797",
|
||||
"lastModified": "2023-04-27T19:15:16.950",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:29:28.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21780",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21781",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:19.860",
|
||||
"lastModified": "2023-04-27T19:15:17.037",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:32:15.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21781",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21782",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:19.920",
|
||||
"lastModified": "2023-04-27T19:15:17.103",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:32:21.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21782",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21785",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.203",
|
||||
"lastModified": "2023-04-27T19:15:17.310",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:28:08.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21785",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21786",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.270",
|
||||
"lastModified": "2023-04-27T19:15:17.373",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:28:13.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21786",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21787",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.330",
|
||||
"lastModified": "2023-04-27T19:15:17.447",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:28:18.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21787",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21788",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.393",
|
||||
"lastModified": "2023-04-27T19:15:17.520",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:28:27.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21788",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21789",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.450",
|
||||
"lastModified": "2023-04-27T19:15:17.577",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:22:56.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21789",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21790",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.517",
|
||||
"lastModified": "2023-04-27T19:15:17.643",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:23:17.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21790",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21791",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.573",
|
||||
"lastModified": "2023-04-27T19:15:17.710",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:23:24.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21791",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21792",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.637",
|
||||
"lastModified": "2023-04-27T19:15:17.773",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:23:29.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21792",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21793",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-01-10T22:15:20.700",
|
||||
"lastModified": "2023-04-27T19:15:17.843",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T14:29:01.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "491EE29F-8BA9-4F0F-98AF-BA6E4F92D7FC"
|
||||
"criteria": "cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "20.0.1",
|
||||
"matchCriteriaId": "12CF8513-78EA-49DF-AF0F-64FA409D9CED"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,7 +67,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21793",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22792",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-09T20:15:11.290",
|
||||
"lastModified": "2023-03-14T08:15:13.333",
|
||||
"lastModified": "2024-02-02T14:15:53.190",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -98,6 +98,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0007/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5372",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22794",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-09T20:15:11.353",
|
||||
"lastModified": "2023-03-14T08:15:13.503",
|
||||
"lastModified": "2024-02-02T14:15:53.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,6 +99,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0008/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5372",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22795",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-09T20:15:11.420",
|
||||
"lastModified": "2023-04-27T18:50:27.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T14:15:53.343",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -94,7 +94,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -119,6 +118,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0010/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5372",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22796",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-02-09T20:15:11.487",
|
||||
"lastModified": "2023-03-14T08:15:13.813",
|
||||
"lastModified": "2024-02-02T14:15:53.433",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0009/",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5372",
|
||||
"source": "support@hackerone.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33785",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.210",
|
||||
"lastModified": "2023-05-27T03:40:16.407",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33786",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.263",
|
||||
"lastModified": "2023-05-27T03:41:10.783",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33787",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.317",
|
||||
"lastModified": "2023-05-27T03:41:18.673",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.373",
|
||||
"lastModified": "2023-05-27T03:42:43.693",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33789",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.430",
|
||||
"lastModified": "2023-05-27T03:42:41.827",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33790",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.487",
|
||||
"lastModified": "2023-05-27T03:42:39.840",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33791",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.543",
|
||||
"lastModified": "2023-05-27T03:42:37.457",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33792",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.607",
|
||||
"lastModified": "2023-05-27T03:42:34.913",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33793",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.663",
|
||||
"lastModified": "2023-05-27T03:42:32.437",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33794",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.717",
|
||||
"lastModified": "2023-05-27T03:42:30.167",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.773",
|
||||
"lastModified": "2023-05-27T03:42:13.380",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.827",
|
||||
"lastModified": "2023-11-07T04:15:25.507",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33797",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.893",
|
||||
"lastModified": "2023-05-27T03:41:35.667",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33798",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:10.947",
|
||||
"lastModified": "2023-05-27T03:41:30.023",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33799",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:11.003",
|
||||
"lastModified": "2023-05-27T03:41:24.217",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33800",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T20:15:11.060",
|
||||
"lastModified": "2023-05-27T03:41:22.007",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34319",
|
||||
"sourceIdentifier": "security@xen.org",
|
||||
"published": "2023-09-22T14:15:45.627",
|
||||
"lastModified": "2024-01-11T19:15:09.340",
|
||||
"lastModified": "2024-02-02T14:15:53.627",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
|
||||
"source": "security@xen.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0001/",
|
||||
"source": "security@xen.org"
|
||||
},
|
||||
{
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-432.html",
|
||||
"source": "security@xen.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34565",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-14T21:15:09.867",
|
||||
"lastModified": "2023-06-23T16:32:00.177",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-36234",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-20T22:15:12.920",
|
||||
"lastModified": "2023-09-22T02:13:39.357",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,8 +59,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC83B0FC-B189-4C58-9CD6-E6EB667635A9"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37625",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T20:15:10.660",
|
||||
"lastModified": "2023-08-15T19:53:36.610",
|
||||
"lastModified": "2024-02-02T13:54:55.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46C71FA3-90B4-460E-A2E7-1BEDD0A10A1C"
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:3.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D4F5D73-39B6-4F84-B414-73D843338475"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3776",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2023-07-21T21:15:11.973",
|
||||
"lastModified": "2024-01-11T19:15:10.830",
|
||||
"lastModified": "2024-02-02T14:15:53.723",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -167,6 +167,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0003/",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5480",
|
||||
"source": "cve-coordination@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3863",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T15:15:09.397",
|
||||
"lastModified": "2023-11-07T04:19:54.433",
|
||||
"lastModified": "2024-02-02T14:15:53.857",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -33,7 +33,7 @@
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -66,7 +66,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -151,6 +151,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0002/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5480",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-39611",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T10:15:08.153",
|
||||
"lastModified": "2024-02-02T10:15:08.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Software FX Chart FX 7 version 7.0.4962.20829 allows attackers to enumerate and read files from the local filesystem by sending crafted web requests."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Software FX Chart FX 7 versi\u00f3n 7.0.4962.20829 permite a los atacantes enumerar y leer archivos del sistema de archivos local mediante el env\u00edo de solicitudes web manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-43756",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:08.890",
|
||||
"lastModified": "2024-02-02T07:15:08.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de lectura fuera de los l\u00edmites."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45116",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-12-21T16:15:08.040",
|
||||
"lastModified": "2024-01-02T14:15:08.360",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:53:50.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45117",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-12-21T16:15:08.380",
|
||||
"lastModified": "2024-01-02T14:15:08.460",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:54:01.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45118",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-12-21T16:15:08.750",
|
||||
"lastModified": "2024-01-02T14:15:08.563",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:52:50.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45119",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-12-21T16:15:09.197",
|
||||
"lastModified": "2024-01-02T14:15:08.657",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:46:30.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45120",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-12-21T17:15:08.153",
|
||||
"lastModified": "2024-01-02T14:15:08.753",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:53:03.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45121",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-12-21T17:15:08.440",
|
||||
"lastModified": "2024-01-02T14:15:08.847",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T13:53:15.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-45734",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:09.267",
|
||||
"lastModified": "2024-02-02T07:15:09.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v3.2.4 and prior versions allow an adjacent attacker arbitrary code execution through out-of-bounds write.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante adyacente ejecute c\u00f3digo arbitrario mediante escritura fuera de los l\u00edmites."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-46045",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T06:15:45.123",
|
||||
"lastModified": "2024-02-02T06:15:45.123",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:37.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Graphviz 2.36 before 10.0.0 has an out-of-bounds read via a crafted config6a file. NOTE: exploitability may be uncommon because this file is typically owned by root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Graphviz 2.36 anterior a 10.0.0 tiene una lectura fuera de los l\u00edmites a trav\u00e9s de un archivo config6a manipulado. NOTA: la explotabilidad puede ser poco com\u00fan porque este archivo normalmente es propiedad del usuario root."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
59
CVE-2023/CVE-2023-471xx/CVE-2023-47142.json
Normal file
59
CVE-2023/CVE-2023-471xx/CVE-2023-47142.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-47142",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T14:15:54.013",
|
||||
"lastModified": "2024-02-02T14:15:54.013",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 could allow an attacker on the organization's local network to escalate their privileges due to unauthorized API access. IBM X-Force ID: 270267."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270267",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-471xx/CVE-2023-47143.json
Normal file
63
CVE-2023/CVE-2023-471xx/CVE-2023-47143.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-47143",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T13:15:08.253",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 270270."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 a 7.3.0.10 es vulnerable a la inyecci\u00f3n de encabezados HTTP, causada por una validaci\u00f3n incorrecta de la entrada por parte de los encabezados HOST. Esto podr\u00eda permitir que un atacante realice varios ataques contra el sistema vulnerable, incluido cross-site scripting, envenenamiento de cach\u00e9 o secuestro de sesi\u00f3n. ID de IBM X-Force: 270270."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-644"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270270",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-471xx/CVE-2023-47144.json
Normal file
63
CVE-2023/CVE-2023-471xx/CVE-2023-47144.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-47144",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T13:15:08.480",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 270271."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 a 7.3.0.10 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 270271."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270271",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-471xx/CVE-2023-47148.json
Normal file
63
CVE-2023/CVE-2023-471xx/CVE-2023-47148.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-47148",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T13:15:08.687",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Storage Protect Plus Server 10.1.0 through 10.1.15.2 Admin Console could allow a remote attacker to obtain sensitive information due to improper validation of unsecured endpoints which could be used in further attacks against the system. IBM X-Force ID: 270599."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Storage Protect Plus Server 10.1.0 a 10.1.15.2 Admin Console podr\u00eda permitir que un atacante remoto obtenga informaci\u00f3n confidencial debido a una validaci\u00f3n inadecuada de endpoints no seguros que podr\u00edan usarse en futuros ataques contra el sistema. ID de IBM X-Force: 270599."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270599",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7096482",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48645",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T09:15:37.420",
|
||||
"lastModified": "2024-02-02T09:15:37.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-49118",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:09.600",
|
||||
"lastModified": "2024-02-02T07:15:09.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v3.2.4 and prior versions allow a local attacker causes information leak through out-of-bounds Read.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v3.2.4 y versiones anteriores permiten que un atacante local provoque una fuga de informaci\u00f3n a trav\u00e9s de lectura fuera de los l\u00edmites."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-50488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T10:15:08.217",
|
||||
"lastModified": "2024-02-02T10:15:08.217",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Blurams Lumi Security Camera (A31C) v23.0406.435.4120 allows attackers to execute arbitrary code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Blurams Lumi Security Camera (A31C) v23.0406.435.4120 permite a los atacantes ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-51072",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T10:15:08.263",
|
||||
"lastModified": "2024-02-02T10:15:08.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the NOC component of Nagios XI version up to and including 2024R1 allows low-privileged users to execute malicious HTML or JavaScript code via the audio file upload functionality from the Operation Center section. This allows any authenticated user to execute arbitrary JavaScript code on behalf of other users, including the administrators."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenada en el componente NOC de la versi\u00f3n Nagios XI hasta 2024R1 inclusive permite a usuarios con pocos privilegios ejecutar c\u00f3digo HTML o JavaScript malicioso a trav\u00e9s de la funcionalidad de carga de archivos de audio desde la secci\u00f3n Operation Center. Esto permite que cualquier usuario autenticado ejecute c\u00f3digo JavaScript arbitrario en nombre de otros usuarios, incluidos los administradores."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-51820",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T10:15:08.320",
|
||||
"lastModified": "2024-02-02T10:15:08.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Blurams Lumi Security Camera (A31C) v.2.3.38.12558 allows a physically proximate attackers to execute arbitrary code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Blurams Lumi Security Camera (A31C) v.2.3.38.12558 permite a atacantes f\u00edsicamente pr\u00f3ximos ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
59
CVE-2023/CVE-2023-66xx/CVE-2023-6672.json
Normal file
59
CVE-2023/CVE-2023-66xx/CVE-2023-6672.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-6672",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-02-02T13:15:08.890",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Stored XSS.This issue affects CyberMath: from v1.4 before v1.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en National Keep Cyber Security Services CyberMath permite almacenar XSS. Este problema afecta a CyberMath: desde v1.4 antes de v1.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0080",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-66xx/CVE-2023-6673.json
Normal file
59
CVE-2023/CVE-2023-66xx/CVE-2023-6673.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-6673",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-02-02T13:15:09.100",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Reflected XSS.This issue affects CyberMath: from v.1.4 before v.1.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en National Keep Cyber Security Services CyberMath permite XSS Reflejado. Este problema afecta a CyberMath: desde v.1.4 antes de v.1.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0080",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-66xx/CVE-2023-6675.json
Normal file
59
CVE-2023/CVE-2023-66xx/CVE-2023-6675.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-6675",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-02-02T13:15:09.300",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in National Keep Cyber Security Services CyberMath allows Upload a Web Shell to a Web Server.This issue affects CyberMath: from v.1.4 before v.1.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en National Keep Cyber Security Services CyberMath permite cargar un Web Shell en un servidor web. Este problema afecta a CyberMath: desde v.1.4 antes de v.1.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0080",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-66xx/CVE-2023-6676.json
Normal file
59
CVE-2023/CVE-2023-66xx/CVE-2023-6676.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-6676",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-02-02T13:15:09.497",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in National Keep Cyber Security Services CyberMath allows Cross Site Request Forgery.This issue affects CyberMath: from v1.4 before v1.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en CyberMath de National Keep Cyber Security Services permite Cross Site Request Forgery. Este problema afecta a CyberMath: desde v1.4 antes de v1.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0080",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-02xx/CVE-2024-0253.json
Normal file
47
CVE-2024/CVE-2024-02xx/CVE-2024-0253.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-0253",
|
||||
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"published": "2024-02-02T13:15:09.700",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ManageEngine ADAudit Plus versions\u00a07270\u00a0and below are vulnerable to the Authenticated SQL injection in\u00a0home Graph-Data.\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 7270 e inferiores de ManageEngine ADAudit Plus son vulnerables a la inyecci\u00f3n de SQL autenticado en Graph-Data dom\u00e9stico."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html",
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-02xx/CVE-2024-0269.json
Normal file
47
CVE-2024/CVE-2024-02xx/CVE-2024-0269.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-0269",
|
||||
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"published": "2024-02-02T13:15:09.880",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ManageEngine ADAudit Plus versions\u00a07270\u00a0and below are vulnerable to the Authenticated SQL injection in\u00a0File-Summary DrillDown. This issue has been fixed and released in version 7271.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 7270 e inferiores de ManageEngine ADAudit Plus son vulnerables a la inyecci\u00f3n de SQL autenticado en File-Summary DrillDown. Este problema se solucion\u00f3 y se public\u00f3 en la versi\u00f3n 7271."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html",
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0285",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:09.980",
|
||||
"lastModified": "2024-02-02T07:15:09.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local cause DOS mediante una entrada incorrecta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0338",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-02-02T10:15:08.370",
|
||||
"lastModified": "2024-02-02T10:15:08.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been found in XAMPP affecting version 8.2.4 and earlier. An attacker could execute arbitrary code through a long file debug argument that controls the Structured Exception Handler (SEH)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en XAMPP que afecta a la versi\u00f3n 8.2.4 y anteriores. Un atacante podr\u00eda ejecutar c\u00f3digo arbitrario a trav\u00e9s de un argumento de depuraci\u00f3n de archivo largo que controla el controlador de excepciones estructurado (SEH)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0553",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-16T12:15:45.557",
|
||||
"lastModified": "2024-01-31T16:15:45.513",
|
||||
"lastModified": "2024-02-02T14:15:54.243",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -184,6 +184,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0011/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0567",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-16T14:15:48.527",
|
||||
"lastModified": "2024-01-29T16:15:08.180",
|
||||
"lastModified": "2024-02-02T14:15:54.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -147,6 +147,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240202-0011/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0685",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-02T05:15:08.603",
|
||||
"lastModified": "2024-02-02T05:15:08.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:37.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Second Order SQL Injection via the email address value submitted through forms in all versions up to, and including, 3.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to inject SQL in their email address that will append additional into the already existing query when an administrator triggers a personal data export."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress plugin for WordPress es vulnerable a la inyecci\u00f3n SQL de segundo orden a trav\u00e9s del valor de la direcci\u00f3n de correo electr\u00f3nico enviado a trav\u00e9s de formularios en todas las versiones hasta la 3.7.1 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados inyecten SQL en su direcci\u00f3n de correo electr\u00f3nico que agregar\u00e1 informaci\u00f3n adicional a la consulta ya existente cuando un administrador active una exportaci\u00f3n de datos personales."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0844",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-02T12:15:49.000",
|
||||
"lastModified": "2024-02-02T12:15:49.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Popup More Popups, Lightboxes, and more popup modules plugin for WordPress is vulnerable to Local File Inclusion in version 2.1.6 via the ycfChangeElementData() function. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files ending with \"Form.php\" on the server , allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Popup More Popups, Lightboxes, and more popup modules para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en la versi\u00f3n 2.1.6 a trav\u00e9s de la funci\u00f3n ycfChangeElementData(). Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, incluyan y ejecuten archivos arbitrarios que terminen en \"Form.php\" en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-0948",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-26T22:15:11.413",
|
||||
"lastModified": "2024-01-27T00:42:46.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-02T14:20:55.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en NetBox hasta 3.7.0. Este problema afecta un procesamiento desconocido del archivo /core/config-revisions del componente Home Page Configuration. La manipulaci\u00f3n con la entrada <>test conduce a cross site scripting. El ataque puede iniciarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-252191. NOTA: Se contact\u00f3 primeramente con proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -71,18 +95,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.7.0",
|
||||
"matchCriteriaId": "9E2660B1-BFE1-460A-A54B-3DAF3C1135B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.252191",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.252191",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-0963",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-02T12:15:49.183",
|
||||
"lastModified": "2024-02-02T12:15:49.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's CP_CALCULATED_FIELDS shortcode in all versions up to, and including, 1.2.52 due to insufficient input sanitization and output escaping on user supplied 'location' attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Calculated Fields Form para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto CP_CALCULATED_FIELDS del complemento en todas las versiones hasta la 1.2.52 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a que la salida se escapa en el atributo de 'ubicaci\u00f3n' proporcionado por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1047",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-02T06:15:45.190",
|
||||
"lastModified": "2024-02-02T06:15:45.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register_reference() function in all versions up to, and including, 2.10.28. This makes it possible for unauthenticated attackers to update the connected API keys."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Orbit Fox de ThemeIsle para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n Register_reference() en todas las versiones hasta la 2.10.28 incluida. Esto hace posible que atacantes no autenticados actualicen las claves API conectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1073",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-02T05:15:09.087",
|
||||
"lastModified": "2024-02-02T05:15:09.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:37.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'filter_array' parameter in all versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento SlimStat Analytics para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'filter_array' en todas las versiones hasta la 5.1.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1143",
|
||||
"sourceIdentifier": "dl_cve@linecorp.com",
|
||||
"published": "2024-02-02T06:15:45.360",
|
||||
"lastModified": "2024-02-02T06:15:45.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Central Dogma versions prior to 0.64.0 is vulnerable to Cross-Site Scripting (XSS), which could allow for the leakage of user sessions and subsequent authentication bypass."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de Central Dogma anteriores a la 0.64.0 son vulnerables a Cross-Site Scripting (XSS), lo que podr\u00eda permitir la fuga de sesiones de usuario y la posterior omisi\u00f3n de autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1162",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-02T06:15:45.407",
|
||||
"lastModified": "2024-02-02T06:15:45.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.10.29. This is due to missing or incorrect nonce validation on the register_reference() function. This makes it possible for unauthenticated attackers to update the connected API keys via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Orbit Fox de ThemeIsle para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.10.29 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n Register_reference(). Esto hace posible que atacantes no autenticados actualicen las claves API conectadas a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
92
CVE-2024/CVE-2024-11xx/CVE-2024-1184.json
Normal file
92
CVE-2024/CVE-2024-11xx/CVE-2024-1184.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-1184",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-02-02T13:15:10.050",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Nsasoft Network Sleuth 3.0.0.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Registration Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-252674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Nsasoft Network Sleuth 3.0.0.0. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del componente Registration Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la denegaci\u00f3n del servicio. Es posible lanzar el ataque al servidor local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-252674 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 1.7
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fitoxs.com/vuldb/10-exploit-perl.txt",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.252674",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.252674",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1201",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-02-02T12:15:49.357",
|
||||
"lastModified": "2024-02-02T12:15:49.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Search path or unquoted item vulnerability in HDD Health affecting versions 4.2.0.112 and earlier. This vulnerability could allow a local attacker to store a malicious executable file within the unquoted search path, resulting in privilege escalation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ruta de b\u00fasqueda o elemento sin comillas en HDD Health que afecta a las versiones 4.2.0.112 y anteriores. Esta vulnerabilidad podr\u00eda permitir que un atacante local almacene un archivo ejecutable malicioso dentro de la ruta de b\u00fasqueda sin comillas, lo que resultar\u00eda en una escalada de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21485",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2024-02-02T05:15:09.510",
|
||||
"lastModified": "2024-02-02T05:15:09.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:37.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of the package dash-core-components before 2.13.0; all versions of the package dash-core-components; versions of the package dash before 2.15.0; all versions of the package dash-html-components; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server.\r\r**Note:**\r\rThis is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Versiones del paquete dash-core-components anteriores a 2.13.0; todas las versiones del paquete dash-core-components; versiones del paquete anteriores a 2.15.0; todas las versiones del paquete dash-html-components; Las versiones del paquete dash-html-components anteriores a la 2.0.16 son vulnerables a Cross-site Scripting (XSS) cuando el href de la etiqueta a est\u00e1 controlado por un adversario. Un atacante autenticado que almacene una vista que aproveche esta vulnerabilidad podr\u00eda robar los datos visibles para otro usuario que abra esa vista, no solo los datos ya incluidos en la p\u00e1gina, sino que tambi\u00e9n podr\u00eda, en teor\u00eda, realizar solicitudes adicionales y acceder a otros datos accesibles para este usuario. En algunos casos, tambi\u00e9n podr\u00edan robar los tokens de acceso de ese usuario, lo que permitir\u00eda al atacante actuar como ese usuario, incluida la visualizaci\u00f3n de otras aplicaciones y recursos alojados en el mismo servidor. **Nota:** Esto solo se puede explotar en aplicaciones Dash que incluyen alg\u00fan mecanismo para almacenar la entrada del usuario para que un usuario diferente la recargue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21780",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-02-02T07:15:10.447",
|
||||
"lastModified": "2024-02-02T07:15:10.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Processing a specially crafted command may result in a denial of service (DoS) condition. Note that the affected products are no longer supported."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en HOME SPOT CUBE2 V102 y versiones anteriores. Procesar un comando especialmente manipulado puede resultar en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Tenga en cuenta que los productos afectados ya no son compatibles."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21845",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:10.633",
|
||||
"lastModified": "2024-02-02T07:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque un desbordamiento en la regi\u00f3n Heap a trav\u00e9s de un desbordamiento de enteros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21851",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:11.070",
|
||||
"lastModified": "2024-02-02T07:15:11.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause heap overflow through integer overflow."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local provoque un desbordamiento en la regi\u00f3n Heap a trav\u00e9s de un desbordamiento de enteros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21860",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:11.530",
|
||||
"lastModified": "2024-02-02T07:15:11.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v4.0.0 and prior versions\n\nallow an adjacent attacker arbitrary code execution in any apps through use after free."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante adyacente ejecute c\u00f3digo arbitrario en cualquier aplicaci\u00f3n mediante un use after free."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-21863",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-02-02T07:15:12.067",
|
||||
"lastModified": "2024-02-02T07:15:12.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nin OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones de OpenHarmony v4.0.0 y versiones anteriores permiten que un atacante local cause DOS mediante una entrada incorrecta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22851",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T09:15:37.473",
|
||||
"lastModified": "2024-02-02T09:15:37.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T13:36:31.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user