Auto-Update: 2024-07-03T02:00:33.205262+00:00

This commit is contained in:
cad-safe-bot 2024-07-03 02:03:28 +00:00
parent f756907d15
commit 44c903429f
1205 changed files with 38247 additions and 3264 deletions

View File

@ -2,8 +2,16 @@
"id": "CVE-2007-3484", "id": "CVE-2007-3484",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2007-06-28T20:30:00.000", "published": "2007-06-28T20:30:00.000",
"lastModified": "2024-06-04T19:16:52.743", "lastModified": "2024-07-03T01:35:02.900",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2010-5153", "id": "CVE-2010-5153",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2012-08-25T21:55:02.413", "published": "2012-08-25T21:55:02.413",
"lastModified": "2024-06-26T19:15:12.027", "lastModified": "2024-07-03T01:35:04.330",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +81,16 @@
"value": "CWE-362" "value": "CWE-362"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2010-5160", "id": "CVE-2010-5160",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2012-08-25T21:55:02.820", "published": "2012-08-25T21:55:02.820",
"lastModified": "2024-06-04T19:16:53.120", "lastModified": "2024-07-03T01:35:06.877",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.4
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +81,16 @@
"value": "CWE-362" "value": "CWE-362"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2010-5164", "id": "CVE-2010-5164",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2012-08-25T21:55:03.007", "published": "2012-08-25T21:55:03.007",
"lastModified": "2024-06-26T19:15:12.250", "lastModified": "2024-07-03T01:35:07.733",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +81,16 @@
"value": "CWE-362" "value": "CWE-362"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2010-5175", "id": "CVE-2010-5175",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2012-08-25T21:55:03.540", "published": "2012-08-25T21:55:03.540",
"lastModified": "2024-06-26T19:15:12.430", "lastModified": "2024-07-03T01:35:08.560",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.4
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +81,16 @@
"value": "CWE-362" "value": "CWE-362"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2011-0611", "id": "CVE-2011-0611",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2011-04-13T14:55:01.217", "published": "2011-04-13T14:55:01.217",
"lastModified": "2024-02-02T02:39:19.227", "lastModified": "2024-07-03T01:35:09.403",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2022-03-03", "cisaExploitAdd": "2022-03-03",
"cisaActionDue": "2022-03-24", "cisaActionDue": "2022-03-24",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -39,6 +40,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -77,6 +98,16 @@
"value": "CWE-843" "value": "CWE-843"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2011-0737", "id": "CVE-2011-0737",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2011-02-01T18:00:04.017", "published": "2011-02-01T18:00:04.017",
"lastModified": "2024-06-04T19:16:53.317", "lastModified": "2024-07-03T01:35:10.423",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +81,16 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2012-5380", "id": "CVE-2012-5380",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2012-10-11T10:51:57.500", "published": "2012-10-11T10:51:57.500",
"lastModified": "2024-06-04T19:16:53.463", "lastModified": "2024-07-03T01:35:11.640",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n", "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n",
"descriptions": [ "descriptions": [
{ {
@ -16,6 +24,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -52,6 +82,16 @@
"value": "NVD-CWE-Other" "value": "NVD-CWE-Other"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2012-6664", "id": "CVE-2012-6664",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:09.767", "published": "2024-06-21T22:15:09.767",
"lastModified": "2024-06-24T12:57:36.513", "lastModified": "2024-07-03T01:35:12.607",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -14,7 +15,42 @@
"value": "M\u00faltiples vulnerabilidades de directory traversal en el servidor TFTP en Distinct Intranet Servers 3.10 y anteriores permiten a atacantes remotos leer o escribir archivos de su elecci\u00f3n mediante un .. (punto punto) en los comandos (1) get o (2) put." "value": "M\u00faltiples vulnerabilidades de directory traversal en el servidor TFTP en Distinct Intranet Servers 3.10 y anteriores permiten a atacantes remotos leer o escribir archivos de su elecci\u00f3n mediante un .. (punto punto) en los comandos (1) get o (2) put."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.exploit-db.com/exploits/41714", "url": "https://www.exploit-db.com/exploits/41714",

View File

@ -2,8 +2,16 @@
"id": "CVE-2013-3245", "id": "CVE-2013-3245",
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"published": "2013-07-10T19:55:04.797", "published": "2013-07-10T19:55:04.797",
"lastModified": "2024-06-04T19:16:53.593", "lastModified": "2024-07-03T01:35:13.413",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +81,20 @@
"value": "CWE-119" "value": "CWE-119"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-125"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2014-0808", "id": "CVE-2014-0808",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2014-01-22T21:55:03.717", "published": "2014-01-22T21:55:03.717",
"lastModified": "2024-06-11T06:15:08.923", "lastModified": "2024-07-03T01:35:14.373",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -51,6 +74,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-566"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2014-5470", "id": "CVE-2014-5470",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:10.417", "published": "2024-06-21T22:15:10.417",
"lastModified": "2024-06-24T12:57:36.513", "lastModified": "2024-07-03T01:35:15.277",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -14,7 +15,42 @@
"value": "Actual Analyzer hasta el 29 de agosto de 2014 permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de metacaracteres del shell porque se utilizan entradas que no son de confianza para parte de los datos de entrada pasados a una operaci\u00f3n de evaluaci\u00f3n." "value": "Actual Analyzer hasta el 29 de agosto de 2014 permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de metacaracteres del shell porque se utilizan entradas que no son de confianza para parte de los datos de entrada pasados a una operaci\u00f3n de evaluaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=35549", "url": "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=35549",

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-2051", "id": "CVE-2015-2051",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2015-02-23T17:59:08.320", "published": "2015-02-23T17:59:08.320",
"lastModified": "2023-04-26T19:27:52.350", "lastModified": "2024-07-03T01:35:16.440",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2022-02-10", "cisaExploitAdd": "2022-02-10",
"cisaActionDue": "2022-08-10", "cisaActionDue": "2022-08-10",
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
@ -19,6 +20,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -55,6 +78,16 @@
"value": "CWE-77" "value": "CWE-77"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2016-10072", "id": "CVE-2016-10072",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2016-12-27T07:59:00.197", "published": "2016-12-27T07:59:00.197",
"lastModified": "2024-06-26T19:15:12.660", "lastModified": "2024-07-03T01:35:17.340",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-264" "value": "CWE-264"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-3721", "id": "CVE-2016-3721",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2016-05-17T14:08:05.593", "published": "2016-05-17T14:08:05.593",
"lastModified": "2024-05-02T14:15:09.123", "lastModified": "2024-07-03T01:35:18.193",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2016-6531", "id": "CVE-2016-6531",
"sourceIdentifier": "cret@cert.org", "sourceIdentifier": "cret@cert.org",
"published": "2016-09-24T10:59:03.650", "published": "2016-09-24T10:59:03.650",
"lastModified": "2024-06-04T19:16:53.970", "lastModified": "2024-07-03T01:35:18.510",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cret@cert.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-14522", "id": "CVE-2017-14522",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-01-26T20:29:00.847", "published": "2018-01-26T20:29:00.847",
"lastModified": "2024-06-04T19:16:54.113", "lastModified": "2024-07-03T01:35:18.887",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-17514", "id": "CVE-2017-17514",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-12-14T16:29:00.370", "published": "2017-12-14T16:29:00.370",
"lastModified": "2024-06-04T19:16:54.240", "lastModified": "2024-07-03T01:35:19.223",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-74" "value": "CWE-74"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-17919", "id": "CVE-2017-17919",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-12-29T16:29:00.297", "published": "2017-12-29T16:29:00.297",
"lastModified": "2024-06-04T19:16:54.370", "lastModified": "2024-07-03T01:35:20.180",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-17973", "id": "CVE-2017-17973",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-12-29T21:29:00.190", "published": "2017-12-29T21:29:00.190",
"lastModified": "2024-06-04T19:16:54.477", "lastModified": "2024-07-03T01:35:21.047",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,9 @@
"id": "CVE-2017-3506", "id": "CVE-2017-3506",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2017-04-24T19:59:03.037", "published": "2017-04-24T19:59:03.037",
"lastModified": "2024-06-07T13:22:32.107", "lastModified": "2024-07-03T01:35:21.677",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-06-03", "cisaExploitAdd": "2024-06-03",
"cisaActionDue": "2024-06-24", "cisaActionDue": "2024-06-24",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -39,6 +40,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -77,6 +98,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-7305", "id": "CVE-2017-7305",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-04-04T16:59:00.237", "published": "2017-04-04T16:59:00.237",
"lastModified": "2024-06-04T19:16:54.933", "lastModified": "2024-07-03T01:35:22.590",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-521" "value": "CWE-521"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-521"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2017-7938", "id": "CVE-2017-7938",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-04-20T14:59:00.223", "published": "2017-04-20T14:59:00.223",
"lastModified": "2024-04-30T07:15:48.343", "lastModified": "2024-07-03T01:35:23.457",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-7961", "id": "CVE-2017-7961",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-04-19T15:59:00.210", "published": "2017-04-19T15:59:00.210",
"lastModified": "2024-06-04T19:16:55.123", "lastModified": "2024-07-03T01:35:23.737",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-8459", "id": "CVE-2017-8459",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-05-03T14:59:00.240", "published": "2017-05-03T14:59:00.240",
"lastModified": "2024-06-26T20:15:12.373", "lastModified": "2024-07-03T01:35:24.003",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-9230", "id": "CVE-2017-9230",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-05-24T16:29:00.180", "published": "2017-05-24T16:29:00.180",
"lastModified": "2024-06-04T19:16:55.253", "lastModified": "2024-07-03T01:35:24.270",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-338" "value": "CWE-338"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-9855", "id": "CVE-2017-9855",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-08-05T17:29:00.553", "published": "2017-08-05T17:29:00.553",
"lastModified": "2024-06-04T19:16:55.507", "lastModified": "2024-07-03T01:35:25.410",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2017-9856", "id": "CVE-2017-9856",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2017-08-05T17:29:00.583", "published": "2017-08-05T17:29:00.583",
"lastModified": "2024-06-04T19:16:55.747", "lastModified": "2024-07-03T01:35:26.443",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-10726", "id": "CVE-2018-10726",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-05-04T15:29:00.483", "published": "2018-05-04T15:29:00.483",
"lastModified": "2024-06-04T19:16:56.023", "lastModified": "2024-07-03T01:35:27.627",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-11116", "id": "CVE-2018-11116",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-06-19T21:29:00.333", "published": "2018-06-19T21:29:00.333",
"lastModified": "2024-06-04T19:16:56.150", "lastModified": "2024-07-03T01:35:28.467",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-732" "value": "CWE-732"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-11681", "id": "CVE-2018-11681",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-06-02T13:29:00.277", "published": "2018-06-02T13:29:00.277",
"lastModified": "2024-06-04T19:16:56.400", "lastModified": "2024-07-03T01:35:29.537",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-798" "value": "CWE-798"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-11682", "id": "CVE-2018-11682",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-06-02T13:29:00.323", "published": "2018-06-02T13:29:00.323",
"lastModified": "2024-06-10T18:15:18.183", "lastModified": "2024-07-03T01:35:30.440",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "CWE-798" "value": "CWE-798"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-11727", "id": "CVE-2018-11727",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-06-19T21:29:00.567", "published": "2018-06-19T21:29:00.567",
"lastModified": "2024-06-04T19:16:56.537", "lastModified": "2024-07-03T01:35:31.443",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -22,6 +30,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -84,6 +114,20 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-16310", "id": "CVE-2018-16310",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-09-06T23:29:01.350", "published": "2018-09-06T23:29:01.350",
"lastModified": "2024-06-10T21:15:48.783", "lastModified": "2024-07-03T01:35:33.430",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-18014", "id": "CVE-2018-18014",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-10-24T21:29:00.750", "published": "2018-10-24T21:29:00.750",
"lastModified": "2024-06-26T20:15:12.740", "lastModified": "2024-07-03T01:35:33.810",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.4
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-19093", "id": "CVE-2018-19093",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-11-07T19:29:00.637", "published": "2018-11-07T19:29:00.637",
"lastModified": "2024-06-04T19:16:56.793", "lastModified": "2024-07-03T01:35:34.453",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +103,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-20437", "id": "CVE-2018-20437",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-12-25T15:29:00.240", "published": "2018-12-25T15:29:00.240",
"lastModified": "2024-06-04T19:16:56.930", "lastModified": "2024-07-03T01:35:35.440",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,9 @@
"id": "CVE-2018-25103", "id": "CVE-2018-25103",
"sourceIdentifier": "cret@cert.org", "sourceIdentifier": "cret@cert.org",
"published": "2024-06-17T18:15:12.650", "published": "2024-06-17T18:15:12.650",
"lastModified": "2024-06-20T12:44:22.977", "lastModified": "2024-07-03T01:35:36.127",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -14,7 +15,30 @@
"value": "Existe una vulnerabilidad de use-after-free en lighttpd <= 1.4.50 que puede permitir el acceso para realizar una comparaci\u00f3n que no distinga entre may\u00fasculas y min\u00fasculas con el puntero reutilizado." "value": "Existe una vulnerabilidad de use-after-free en lighttpd <= 1.4.50 que puede permitir el acceso para realizar una comparaci\u00f3n que no distinga entre may\u00fasculas y min\u00fasculas con el puntero reutilizado."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736", "url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736",

View File

@ -2,8 +2,9 @@
"id": "CVE-2018-4233", "id": "CVE-2018-4233",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2018-06-08T18:29:02.057", "published": "2018-06-08T18:29:02.057",
"lastModified": "2019-06-02T17:29:00.610", "lastModified": "2024-07-03T01:35:36.460",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +96,16 @@
"value": "CWE-119" "value": "CWE-119"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2018-4404", "id": "CVE-2018-4404",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2019-01-11T18:29:03.140", "published": "2019-01-11T18:29:03.140",
"lastModified": "2023-11-07T02:58:24.420", "lastModified": "2024-07-03T01:35:37.820",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +96,16 @@
"value": "CWE-119" "value": "CWE-119"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2018-5278", "id": "CVE-2018-5278",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2018-01-08T05:29:00.697", "published": "2018-01-08T05:29:00.697",
"lastModified": "2024-06-11T19:16:04.457", "lastModified": "2024-07-03T01:35:39.040",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,16 @@
"id": "CVE-2019-1010023", "id": "CVE-2019-1010023",
"sourceIdentifier": "josh@bress.net", "sourceIdentifier": "josh@bress.net",
"published": "2019-07-15T04:15:13.397", "published": "2019-07-15T04:15:13.397",
"lastModified": "2024-06-11T19:16:04.713", "lastModified": "2024-07-03T01:35:40.327",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "josh@bress.net",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1057", "id": "CVE-2019-1057",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:13.860", "published": "2019-08-14T21:15:13.860",
"lastModified": "2024-05-29T17:15:56.280", "lastModified": "2024-07-03T01:35:49.753",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-611" "value": "CWE-611"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1150", "id": "CVE-2019-1150",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:14.877", "published": "2019-08-14T21:15:14.877",
"lastModified": "2024-05-29T17:16:01.677", "lastModified": "2024-07-03T01:35:51.453",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1157", "id": "CVE-2019-1157",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:15.377", "published": "2019-08-14T21:15:15.377",
"lastModified": "2024-05-29T17:16:03.650", "lastModified": "2024-07-03T01:35:52.550",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1162", "id": "CVE-2019-1162",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:15.657", "published": "2019-08-14T21:15:15.657",
"lastModified": "2024-05-29T17:16:04.553", "lastModified": "2024-07-03T01:35:53.940",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1174", "id": "CVE-2019-1174",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:16.283", "published": "2019-08-14T21:15:16.283",
"lastModified": "2024-05-29T17:16:06.970", "lastModified": "2024-07-03T01:35:55.440",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1257"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1175", "id": "CVE-2019-1175",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:16.347", "published": "2019-08-14T21:15:16.347",
"lastModified": "2024-05-29T17:16:07.200", "lastModified": "2024-07-03T01:35:56.507",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1177", "id": "CVE-2019-1177",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:16.453", "published": "2019-08-14T21:15:16.453",
"lastModified": "2024-05-29T17:16:07.710", "lastModified": "2024-07-03T01:35:57.300",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1185", "id": "CVE-2019-1185",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:17.047", "published": "2019-08-14T21:15:17.047",
"lastModified": "2024-05-29T17:16:09.763", "lastModified": "2024-07-03T01:35:58.330",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +96,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1188", "id": "CVE-2019-1188",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:17.237", "published": "2019-08-14T21:15:17.237",
"lastModified": "2024-05-29T17:16:10.430", "lastModified": "2024-07-03T01:35:59.260",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-59" "value": "CWE-59"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1193", "id": "CVE-2019-1193",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:17.440", "published": "2019-08-14T21:15:17.440",
"lastModified": "2024-05-29T17:16:11.180", "lastModified": "2024-07-03T01:36:00.023",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1194", "id": "CVE-2019-1194",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:17.517", "published": "2019-08-14T21:15:17.517",
"lastModified": "2024-05-29T17:16:11.437", "lastModified": "2024-07-03T01:36:00.767",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2019-12760", "id": "CVE-2019-12760",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-06-06T19:29:00.500", "published": "2019-06-06T19:29:00.500",
"lastModified": "2024-06-11T21:15:51.900", "lastModified": "2024-07-03T01:35:41.783",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.7,
"impactScore": 2.5
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1205", "id": "CVE-2019-1205",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:18.220", "published": "2019-08-14T21:15:18.220",
"lastModified": "2024-05-29T17:16:13.340", "lastModified": "2024-07-03T01:36:01.620",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1227", "id": "CVE-2019-1227",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:18.953", "published": "2019-08-14T21:15:18.953",
"lastModified": "2024-05-29T17:16:15.713", "lastModified": "2024-07-03T01:36:02.340",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-1228", "id": "CVE-2019-1228",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-08-14T21:15:19.033", "published": "2019-08-14T21:15:19.033",
"lastModified": "2024-05-29T17:16:15.987", "lastModified": "2024-07-03T01:36:03.077",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +74,16 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2019-13644", "id": "CVE-2019-13644",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-07-18T03:15:10.310", "published": "2019-07-18T03:15:10.310",
"lastModified": "2024-06-04T19:16:57.510", "lastModified": "2024-07-03T01:35:42.100",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +23,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-14232", "id": "CVE-2019-14232",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-08-02T15:15:11.880", "published": "2019-08-02T15:15:11.880",
"lastModified": "2024-05-01T17:15:23.913", "lastModified": "2024-07-03T01:35:42.547",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [ "cvssMetricV30": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -73,6 +96,16 @@
"value": "CWE-400" "value": "CWE-400"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2019-19589", "id": "CVE-2019-19589",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-12-05T04:15:11.677", "published": "2019-12-05T04:15:11.677",
"lastModified": "2024-06-04T19:16:58.127", "lastModified": "2024-07-03T01:35:45.240",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-436" "value": "CWE-436"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-436"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-19750", "id": "CVE-2019-19750",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-12-12T18:15:13.930", "published": "2019-12-12T18:15:13.930",
"lastModified": "2024-04-30T18:15:19.217", "lastModified": "2024-07-03T01:35:46.357",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-19751", "id": "CVE-2019-19751",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.323", "published": "2024-04-30T18:15:19.323",
"lastModified": "2024-04-30T19:35:36.960", "lastModified": "2024-07-03T01:35:47.590",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,18 @@
} }
], ],
"metrics": {}, "metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-300"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://blog.easymine.io", "url": "https://blog.easymine.io",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-19754", "id": "CVE-2019-19754",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.507", "published": "2024-04-30T18:15:19.507",
"lastModified": "2024-04-30T19:35:36.960", "lastModified": "2024-07-03T01:35:48.790",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,6 +16,18 @@
} }
], ],
"metrics": {}, "metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://hiveos.farm/changelog/", "url": "https://hiveos.farm/changelog/",

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-7256", "id": "CVE-2019-7256",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-07-02T19:15:11.147", "published": "2019-07-02T19:15:11.147",
"lastModified": "2024-05-23T17:58:01.130", "lastModified": "2024-07-03T01:36:04.380",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-03-25", "cisaExploitAdd": "2024-03-25",
"cisaActionDue": "2024-04-15", "cisaActionDue": "2024-04-15",
"cisaRequiredAction": "Contact the vendor for guidance on remediating firmware, per their advisory.", "cisaRequiredAction": "Contact the vendor for guidance on remediating firmware, per their advisory.",
@ -39,6 +40,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 6.0 "impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -77,6 +98,16 @@
"value": "CWE-78" "value": "CWE-78"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-10672", "id": "CVE-2020-10672",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-18T22:15:12.313", "published": "2020-03-18T22:15:12.313",
"lastModified": "2023-11-07T03:14:11.640", "lastModified": "2024-07-03T01:36:05.477",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "NVD-CWE-Other" "value": "NVD-CWE-Other"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-10673", "id": "CVE-2020-10673",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-18T22:15:12.407", "published": "2020-03-18T22:15:12.407",
"lastModified": "2023-11-07T03:14:11.723", "lastModified": "2024-07-03T01:36:08.040",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "NVD-CWE-Other" "value": "NVD-CWE-Other"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-10968", "id": "CVE-2020-10968",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-26T13:15:12.970", "published": "2020-03-26T13:15:12.970",
"lastModified": "2023-11-07T03:14:26.457", "lastModified": "2024-07-03T01:36:08.923",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-10969", "id": "CVE-2020-10969",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-26T13:15:13.077", "published": "2020-03-26T13:15:13.077",
"lastModified": "2023-11-07T03:14:26.560", "lastModified": "2024-07-03T01:36:09.833",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-11111", "id": "CVE-2020-11111",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-31T05:15:13.007", "published": "2020-03-31T05:15:13.007",
"lastModified": "2023-11-07T03:14:30.317", "lastModified": "2024-07-03T01:36:10.713",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-11112", "id": "CVE-2020-11112",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-31T05:15:13.070", "published": "2020-03-31T05:15:13.070",
"lastModified": "2023-11-07T03:14:30.397", "lastModified": "2024-07-03T01:36:11.610",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-11113", "id": "CVE-2020-11113",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-03-31T05:15:13.117", "published": "2020-03-31T05:15:13.117",
"lastModified": "2023-11-07T03:14:30.480", "lastModified": "2024-07-03T01:36:12.463",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-11876", "id": "CVE-2020-11876",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-04-17T16:15:13.977", "published": "2020-04-17T16:15:13.977",
"lastModified": "2024-06-04T19:17:00.030", "lastModified": "2024-07-03T01:36:13.627",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-327" "value": "CWE-327"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-12667", "id": "CVE-2020-12667",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-05-19T13:15:11.763", "published": "2020-05-19T13:15:11.763",
"lastModified": "2024-04-26T07:15:47.467", "lastModified": "2024-07-03T01:36:14.667",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-400" "value": "CWE-400"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-13654", "id": "CVE-2020-13654",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-12-31T01:15:12.600", "published": "2020-12-31T01:15:12.600",
"lastModified": "2024-05-02T17:15:07.590", "lastModified": "2024-07-03T01:36:15.643",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-116" "value": "CWE-116"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-13965", "id": "CVE-2020-13965",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-06-09T03:15:11.250", "published": "2020-06-09T03:15:11.250",
"lastModified": "2024-06-27T18:06:30.240", "lastModified": "2024-07-03T01:36:16.497",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-06-26", "cisaExploitAdd": "2024-06-26",
"cisaActionDue": "2024-07-17", "cisaActionDue": "2024-07-17",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -39,6 +40,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -77,6 +98,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-14318", "id": "CVE-2020-14318",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2020-12-03T16:15:12.077", "published": "2020-12-03T16:15:12.077",
"lastModified": "2024-04-22T16:15:11.597", "lastModified": "2024-07-03T01:36:17.507",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -83,6 +104,16 @@
"value": "CWE-269" "value": "CWE-269"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-14323", "id": "CVE-2020-14323",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2020-10-29T20:15:17.117", "published": "2020-10-29T20:15:17.117",
"lastModified": "2024-04-22T16:15:11.780", "lastModified": "2024-07-03T01:36:18.413",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-1493", "id": "CVE-2020-1493",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2020-08-17T19:15:16.210", "published": "2020-08-17T19:15:16.210",
"lastModified": "2024-01-19T00:15:12.853", "lastModified": "2024-07-03T01:36:22.230",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-15778", "id": "CVE-2020-15778",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-07-24T14:15:12.450", "published": "2020-07-24T14:15:12.450",
"lastModified": "2024-06-04T19:17:00.783", "lastModified": "2024-07-03T01:36:18.793",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-78" "value": "CWE-78"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-17519", "id": "CVE-2020-17519",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2021-01-05T12:15:12.680", "published": "2021-01-05T12:15:12.680",
"lastModified": "2024-06-10T15:23:11.997", "lastModified": "2024-07-03T01:36:20.030",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-05-23", "cisaExploitAdd": "2024-05-23",
"cisaActionDue": "2024-06-13", "cisaActionDue": "2024-06-13",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -39,6 +40,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-18305", "id": "CVE-2020-18305",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T06:36:01.630", "published": "2024-05-14T06:36:01.630",
"lastModified": "2024-05-14T16:13:02.773", "lastModified": "2024-07-03T01:36:20.330",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -14,7 +15,42 @@
"value": "Se descubri\u00f3 que Extreme Networks EXOS anteriores a v.22.7 y anteriores a v.30.2 conten\u00eda un problema en su GUI web que no restringe el acceso a la URL, lo que permite a los atacantes acceder a informaci\u00f3n confidencial o escalar privilegios." "value": "Se descubri\u00f3 que Extreme Networks EXOS anteriores a v.22.7 y anteriores a v.30.2 conten\u00eda un problema en su GUI web que no restringe el acceso a la URL, lo que permite a los atacantes acceder a informaci\u00f3n confidencial o escalar privilegios."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c", "url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c",

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-18900", "id": "CVE-2020-18900",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-08-19T22:15:07.373", "published": "2021-08-19T22:15:07.373",
"lastModified": "2024-06-04T19:17:01.007", "lastModified": "2024-07-03T01:36:21.130",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-25575", "id": "CVE-2020-25575",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-09-14T19:15:11.397", "published": "2020-09-14T19:15:11.397",
"lastModified": "2024-06-04T19:17:01.203", "lastModified": "2024-07-03T01:36:23.557",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-843" "value": "CWE-843"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-27986", "id": "CVE-2020-27986",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-10-28T23:15:12.410", "published": "2020-10-28T23:15:12.410",
"lastModified": "2024-06-04T19:17:01.417", "lastModified": "2024-07-03T01:36:24.937",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -77,6 +105,20 @@
"value": "CWE-312" "value": "CWE-312"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
},
{
"lang": "en",
"value": "CWE-312"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-28246", "id": "CVE-2020-28246",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-06-02T14:15:26.700", "published": "2022-06-02T14:15:26.700",
"lastModified": "2024-06-04T19:17:01.543", "lastModified": "2024-07-03T01:36:25.867",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-74" "value": "CWE-74"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2020-35587", "id": "CVE-2020-35587",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-12-23T16:15:12.950", "published": "2020-12-23T16:15:12.950",
"lastModified": "2024-06-04T19:17:01.813", "lastModified": "2024-07-03T01:36:27.170",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +81,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-36179", "id": "CVE-2020-36179",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-01-07T00:15:14.850", "published": "2021-01-07T00:15:14.850",
"lastModified": "2023-11-07T03:22:06.623", "lastModified": "2024-07-03T01:36:28.273",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-36180", "id": "CVE-2020-36180",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-01-07T00:15:14.913", "published": "2021-01-07T00:15:14.913",
"lastModified": "2023-09-13T14:56:32.590", "lastModified": "2024-07-03T01:36:30.047",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-36181", "id": "CVE-2020-36181",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-01-06T23:15:12.957", "published": "2021-01-06T23:15:12.957",
"lastModified": "2023-09-13T14:56:39.930", "lastModified": "2024-07-03T01:36:30.900",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-36182", "id": "CVE-2020-36182",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-01-07T00:15:14.960", "published": "2021-01-07T00:15:14.960",
"lastModified": "2023-09-13T14:56:46.657", "lastModified": "2024-07-03T01:36:31.760",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-36184", "id": "CVE-2020-36184",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-01-06T23:15:13.017", "published": "2021-01-06T23:15:13.017",
"lastModified": "2023-09-13T14:57:10.147", "lastModified": "2024-07-03T01:36:32.620",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +94,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-25310", "id": "CVE-2021-25310",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-02-02T15:15:16.840", "published": "2021-02-02T15:15:16.840",
"lastModified": "2024-06-04T19:17:02.997", "lastModified": "2024-07-03T01:36:36.343",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -73,6 +81,16 @@
"value": "CWE-78" "value": "CWE-78"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-150"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-26918", "id": "CVE-2021-26918",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-02-09T03:15:12.850", "published": "2021-02-09T03:15:12.850",
"lastModified": "2024-06-04T19:17:03.393", "lastModified": "2024-07-03T01:36:37.450",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-434" "value": "CWE-434"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-26928", "id": "CVE-2021-26928",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-06-04T21:15:07.433", "published": "2021-06-04T21:15:07.433",
"lastModified": "2024-06-04T19:17:03.527", "lastModified": "2024-07-03T01:36:38.313",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 1.6, "exploitabilityScore": 1.6,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-306" "value": "CWE-306"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-28246", "id": "CVE-2021-28246",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-03-26T08:15:12.730", "published": "2021-03-26T08:15:12.730",
"lastModified": "2024-06-18T19:15:55.260", "lastModified": "2024-07-03T01:36:39.333",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-426" "value": "CWE-426"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-28248", "id": "CVE-2021-28248",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-03-26T08:15:13.103", "published": "2021-03-26T08:15:13.103",
"lastModified": "2024-06-04T19:17:03.980", "lastModified": "2024-07-03T01:36:40.460",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "CWE-307" "value": "CWE-307"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,16 @@
"id": "CVE-2021-30496", "id": "CVE-2021-30496",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-04-20T16:15:10.590", "published": "2021-04-20T16:15:10.590",
"lastModified": "2024-06-04T19:17:04.460", "lastModified": "2024-07-03T01:36:41.530",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -35,6 +43,26 @@
}, },
"exploitabilityScore": 2.1, "exploitabilityScore": 2.1,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -73,6 +101,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-31954", "id": "CVE-2021-31954",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2021-06-08T23:15:08.793", "published": "2021-06-08T23:15:08.793",
"lastModified": "2023-08-01T23:15:13.470", "lastModified": "2024-07-03T01:36:42.700",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -93,6 +94,16 @@
"value": "CWE-269" "value": "CWE-269"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-31955", "id": "CVE-2021-31955",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2021-06-08T23:15:08.817", "published": "2021-06-08T23:15:08.817",
"lastModified": "2023-08-01T23:15:13.570", "lastModified": "2024-07-03T01:36:43.470",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2021-11-03", "cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17", "cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
@ -97,6 +98,16 @@
"value": "CWE-200" "value": "CWE-200"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-31970", "id": "CVE-2021-31970",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2021-06-08T23:15:09.183", "published": "2021-06-08T23:15:09.183",
"lastModified": "2023-08-01T23:15:14.843", "lastModified": "2024-07-03T01:36:44.367",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -93,6 +94,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
} }
], ],
"configurations": [ "configurations": [

Some files were not shown because too many files have changed in this diff Show More