Auto-Update: 2024-02-09T00:55:15.040763+00:00

This commit is contained in:
cad-safe-bot 2024-02-09 00:55:18 +00:00
parent 377824d5a8
commit 51d6f19d75
42 changed files with 18324 additions and 2707 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-1850",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2016-10-18T02:27:37.347",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:29:54.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -18,6 +18,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -51,7 +73,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-667"
}
]
}
@ -81,41 +103,57 @@
"references": [
{
"url": "http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/generators/mod_cgi.c?r1=1.148.2.7&r2=1.148.2.8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=10515",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=22030",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "http://marc.info/?l=apache-httpd-dev&m=103291952019514&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/bugtraq/2002/Sep/0253.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1007823",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.iss.net/security_center/static/10200.php",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
@ -123,14 +161,20 @@
"url": "http://www.securityfocus.com/bid/5787",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/8725",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0421",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-18T04:00:00.000",
"lastModified": "2017-10-11T01:29:25.997",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:27:40.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-125"
}
]
}
@ -62,88 +62,88 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06B5433F-2173-4A9F-9A50-2ACBC4ADB7C8"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0651E86E-5D11-4FC5-AF7E-431826FAD754"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1A61AA4D-E9AE-4C09-9DAB-0E8034FE77A9"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B79DC5F-5062-4031-BA11-746EE3C8E1CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4F6BE1F2-76BF-4182-B5A8-C189221CDF40"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6284AC45-DDA1-4084-B23A-6D36618140A6"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "35F2B503-1516-465D-A558-9932BDB3457D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2D4098-4051-48B9-8A71-98BF24F0A284"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BA94EAAA-A4D2-4E36-BC69-BBE9644FE970"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "314AB5E6-39D8-47E3-A383-0F16B271830B"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3A7C96C-8FBB-42B4-937E-3321C939CC87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C22EE5D6-3163-4217-8A65-08D4904C51AA"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "94084356-D39B-41B2-AC24-0ADAD0BF5988"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7F0CDA-F270-40C5-AE72-D3F0856883B5"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "086C6335-7872-46A7-AEB1-9BE5AE5A788C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8DED92-89D4-42C1-8898-B2A0B1EF4CB1"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "FF8233B1-04A0-4E25-97EE-CF466B48A12E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "26C6F860-C157-4FBA-ABD9-7C4451B241D3"
"criteria": "cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FA714E7E-05EF-4598-9324-887BC66C675E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng3:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "41FF0D8A-5DCC-494B-A97D-58C5FD288462"
"criteria": "cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C036011A-9AE1-423C-8B73-188B9BA20FEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng3:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C96453B9-3278-4063-BD27-2890CCEC338B"
"criteria": "cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng3:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "33500CD3-355B-4CC0-9C2C-DCC0737D5C4C"
"criteria": "cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8051459E-94D3-4D4A-9D40-CC9475DDB00C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng3:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDAAAC1-C4AD-45F4-AB05-D79AAFDBDD4E"
"criteria": "cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "42056C63-69A7-43CF-828C-0C3E365702D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng3:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BF52AFA-4E5C-4604-9991-49B0A3914C5F"
"criteria": "cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6A39A3-7F86-4DC3-B248-859630AFB9A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greg_roelofs:libpng3:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E441AA95-93C0-4907-AF04-89B334D2048D"
"criteria": "cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "58377AE3-1C13-4C3F-BC55-8336DAEEF97F"
},
{
"vulnerable": true,
@ -157,43 +157,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-16:*:i386:*:*:*:*:*",
"matchCriteriaId": "BAA6E707-3B69-4F40-B968-966FE421ADAB"
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-16:*:*:*:*:*:*:*",
"matchCriteriaId": "4826B607-8DAB-44A4-B4FF-4BBFF9A05487"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-16:*:i386_dev:*:*:*:*:*",
"matchCriteriaId": "CDA1B0DD-1C99-469B-B2A8-AEBBE8344575"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-20:*:i386:*:*:*:*:*",
"matchCriteriaId": "CC96916B-034A-4EC8-90C0-BF6EEFAA7666"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-20:*:i386_dev:*:*:*:*:*",
"matchCriteriaId": "8BEDB18F-2C46-43E9-A1BD-A9533550A719"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:10.1.0.13.8:*:i386:*:*:*:*:*",
"matchCriteriaId": "6DC445E6-0B31-48BB-8A2B-A17BDD999EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:10.1.0.13.8:*:i386_dev:*:*:*:*:*",
"matchCriteriaId": "752F8C9A-0F4E-4FC3-B98E-0437090A0000"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:10.1.0.13.11:*:i386:*:*:*:*:*",
"matchCriteriaId": "49E6A477-3AAE-42CD-809A-AEAB24525B3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:libpng:10.1.0.13.11:*:i386_dev:*:*:*:*:*",
"matchCriteriaId": "037731D3-BBB6-4993-8B20-9412E859DE3C"
"criteria": "cpe:2.3:a:redhat:libpng:1.2.2-20:*:*:*:*:*:*:*",
"matchCriteriaId": "3701107A-C208-426B-9EA0-CD1794D0EDA3"
}
]
}
@ -207,49 +177,19 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
"matchCriteriaId": "2641EE56-6F9D-400B-B456-877F4DA79B10"
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A423B773-6B8B-4BA3-80A1-C8CAEF4D9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "E0B458EA-495E-40FA-9379-C03757F7B1EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
"matchCriteriaId": "1728AB5D-55A9-46B0-A412-6F7263CAEB5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
"matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
"matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4"
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
"matchCriteriaId": "84A50ED3-FD0D-4038-B3E7-CC65D166C968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
"matchCriteriaId": "777F9EC0-2919-45CA-BFF8-78A02537C513"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
@ -268,71 +208,129 @@
"references": [
{
"url": "http://lists.apple.com/mhonarc/security-announce/msg00056.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108334922320309&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108335030208523&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=fedora-announce-list&m=108451350029261&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=fedora-announce-list&m=108451353608968&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/22957",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22958",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2004/dsa-498",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:040",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:212",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:213",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-180.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-181.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/10244",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16022",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2005-1036",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2008-09-05T20:48:02.110",
"lastModified": "2024-02-08T23:47:27.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,13 +66,14 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-909"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -58,33 +81,21 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7"
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndIncluding": "5.4",
"matchCriteriaId": "4C8FBB70-DF79-4618-8ED3-1167562CB997"
}
]
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD73CDB-94C5-4DBF-8B4C-DD3E4E399445"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD85B1ED-1473-4C22-9E1E-53F07CF517E9"
"vulnerable": false,
"criteria": "cpe:2.3:h:amd:amd64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7145CF8C-9447-430F-BF8A-9B061F6E24C9"
}
]
}
@ -94,7 +105,10 @@
"references": [
{
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:03.amd64.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-2456",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-08-04T04:00:00.000",
"lastModified": "2023-11-07T01:57:37.883",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:44:12.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-667"
}
]
}
@ -68,100 +90,191 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/16298",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/16500",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17002",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17073",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17826",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18056",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18059",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-921",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-922",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba%3Bhp=ecade4893a139cc35d4fe345ce70242ede5358c4%3Bhb=a4f1bac62564049ea4718c4624b0fadc9f597c84%3Bf=net/xfrm/xfrm_user.c",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a4f1bac62564049ea4718c4624b0fadc9f597c84",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mail-archive.com/netdev%40vger.kernel.org/msg00520.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_50_kernel.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-514.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-663.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/14477",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2005/1878",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21710",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10858",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://usn.ubuntu.com/169-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-3749",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-11-15T01:46:00.000",
"lastModified": "2017-07-29T01:32:30.817",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:35:32.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-665"
}
]
}
@ -62,58 +84,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715"
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndIncluding": "10.4.10",
"matchCriteriaId": "ED9822D0-73F1-4B57-ADB5-0EBA7F78C7F1"
}
]
}
@ -123,24 +97,48 @@
"references": [
{
"url": "http://docs.info.apple.com/article.html?artnum=307041",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/27643",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/26444",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
@ -148,12 +146,17 @@
"url": "http://www.vupen.com/english/advisories/2007/3868",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38466",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-0062",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-19T10:44:00.000",
"lastModified": "2023-12-28T15:34:12.043",
"lastModified": "2024-02-09T00:42:52.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-665"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0063",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-19T10:44:00.000",
"lastModified": "2018-10-15T21:57:18.840",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:35:55.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,41 +70,14 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C73BED9E-29FB-4965-B38F-013FFE5A9170"
}
]
},
{
"operator": "OR",
"negate": false,
@ -90,8 +85,154 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.3_kdc",
"matchCriteriaId": "18C8F666-E82A-40B8-B425-8575057FBB7F"
"versionEndIncluding": "1.6.3",
"matchCriteriaId": "904FBF9F-9269-4088-BD5A-3C773E6F841E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.4.11",
"matchCriteriaId": "A1E0F574-6859-45A6-B160-7DDE92C07CC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.0",
"versionEndExcluding": "10.5.2",
"matchCriteriaId": "D139BCA7-8B43-4BDE-9AE9-5F41F4B6BD0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.4.11",
"matchCriteriaId": "B2D0444E-6B76-46EE-95EF-617F8967F6B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.0",
"versionEndExcluding": "10.5.2",
"matchCriteriaId": "E4317913-336B-40CD-AF63-9F11C374419D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "24818450-FDA1-429A-AC17-68F44F584217"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A9BD0E68-2DC1-47EA-882A-6F5921A0F1BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C8FC5E32-C9E3-49F6-9481-1DB60DEE8A07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "29184B59-5756-48DB-930C-69D5CD628548"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*",
"matchCriteriaId": "33EB57D5-DE8D-417C-8C00-AD331D61181C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
}
]
}
@ -101,107 +242,302 @@
"references": [
{
"url": "http://docs.info.apple.com/article.html?artnum=307562",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/29420",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29423",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29424",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29428",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29435",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29438",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29450",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29451",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29457",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29462",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29464",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29516",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/29663",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/30535",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Third Party Advisory"
]
},
{
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1524",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/489761",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/28303",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1019627",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-587-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0922/references",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -209,6 +545,7 @@
"url": "http://www.vupen.com/english/advisories/2008/0924/references",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -216,6 +553,7 @@
"url": "http://www.vupen.com/english/advisories/2008/1102/references",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -223,24 +561,38 @@
"url": "http://www.vupen.com/english/advisories/2008/1744",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41277",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0081",
"sourceIdentifier": "secure@microsoft.com",
"published": "2008-01-16T23:00:00.000",
"lastModified": "2018-10-12T21:44:42.130",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T23:42:31.667",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-908"
}
]
}
@ -82,8 +104,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25"
"criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:macos:*:*",
"matchCriteriaId": "0B191155-67F2-4C6E-BD0C-AF5AF6F04BA1"
}
]
}
@ -93,16 +115,34 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=120585858807305&w=2",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/28506",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1019200",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.microsoft.com/technet/security/advisory/947563.mspx",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
@ -110,13 +150,18 @@
"url": "http://www.securityfocus.com/bid/27305",
"source": "secure@microsoft.com",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-071A.html",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
@ -124,6 +169,7 @@
"url": "http://www.vupen.com/english/advisories/2008/0146",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -131,20 +177,32 @@
"url": "http://www.vupen.com/english/advisories/2008/0846/references",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39699",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5546",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-2934",
"sourceIdentifier": "secalert@redhat.com",
"published": "2008-07-18T16:41:00.000",
"lastModified": "2017-08-08T01:31:27.357",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T23:43:34.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -22,6 +22,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -55,7 +77,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-908"
}
]
}
@ -70,8 +92,10 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.0.1",
"matchCriteriaId": "2DFD12BC-44F1-4410-9FF4-D04FA9A2E048"
}
]
},
@ -81,8 +105,23 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "412DF091-7604-4110-87A0-3488116A97E5"
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC"
}
]
}
@ -90,41 +129,96 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/31132",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/31270",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/34501",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1020516",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mozilla.org/security/announce/2008/mfsa2008-36.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/30266",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-626-1",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2125",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/0977",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=441360",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43850",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-3475",
"sourceIdentifier": "secure@microsoft.com",
"published": "2008-10-15T00:12:15.833",
"lastModified": "2023-12-07T18:38:56.693",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T23:46:51.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-908"
}
]
}
@ -65,91 +87,7 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*",
"matchCriteriaId": "F3F2A51E-2675-4993-B9C2-F2D176A92857"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "DA778424-6F70-4AB6-ADD5-5D4664DFE463"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"matchCriteriaId": "BCE2197B-7C58-4693-B9BB-0B31EABB6B66"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:x64:*:*:*:*:*",
"matchCriteriaId": "8D91FC0B-92FA-4182-9B87-A462850BD510"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*",
"matchCriteriaId": "74EE55A2-6020-4591-9F15-80E57D19207C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"matchCriteriaId": "1AB9988B-5A9C-4F6D-BCCC-4D03AC6E4CF9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
@ -163,8 +101,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF"
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
"matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5"
}
]
}
@ -179,8 +117,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*",
"matchCriteriaId": "0C69B5E6-D1AF-46F1-8AE6-DD5D4E3D9160"
}
]
},
@ -190,73 +128,140 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "DA778424-6F70-4AB6-ADD5-5D4664DFE463"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "E3C43D05-40F8-4769-BA6B-A376420EA972"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"matchCriteriaId": "BCE2197B-7C58-4693-B9BB-0B31EABB6B66"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "43D64F8D-975A-4A5B-BEDF-D27D65C96A29"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp1:x64:*:*:*:*:*",
"matchCriteriaId": "8D91FC0B-92FA-4182-9B87-A462850BD510"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:-:*:itanium:*",
"matchCriteriaId": "8856A97B-4C43-45E5-B1DB-89EB9C350265"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*",
"matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:professional:*:x64:*",
"matchCriteriaId": "18420EC8-633E-4AED-B33F-5A3C673C396D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*",
"matchCriteriaId": "D34A558F-A656-43EB-AC52-C3710F77CDD8"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*",
"matchCriteriaId": "F9DC56EB-EDC4-4DFE-BA9B-B17FF4A91734"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C162FFF0-1E8F-4DCF-A08F-6C6E324ED878"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC71FD8-D385-4507-BD14-B75FDD4C79E6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
"matchCriteriaId": "E3C43D05-40F8-4769-BA6B-A376420EA972"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*",
"matchCriteriaId": "74EE55A2-6020-4591-9F15-80E57D19207C"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "43D64F8D-975A-4A5B-BEDF-D27D65C96A29"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:-:*:itanium:*",
"matchCriteriaId": "8856A97B-4C43-45E5-B1DB-89EB9C350265"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"matchCriteriaId": "1AB9988B-5A9C-4F6D-BCCC-4D03AC6E4CF9"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*",
"matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:professional:*:x64:*",
"matchCriteriaId": "18420EC8-633E-4AED-B33F-5A3C673C396D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
@ -266,57 +271,101 @@
"references": [
{
"url": "http://ifsec.blogspot.com/2008/10/internet-explorer-6-componentfrompoint.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=122479227205998&w=2",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.securityfocus.com/archive/1/497380/100/0/threaded",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/31617",
"source": "secure@microsoft.com",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1021047",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA08-288A.html",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2809",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-08-069/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45563",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45565",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13151",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-3688",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-14T22:41:00.000",
"lastModified": "2023-12-22T18:36:45.657",
"lastModified": "2024-02-08T23:44:44.063",
"vulnStatus": "Analyzed",
"evaluatorComment": "https://sourceforge.net/mailarchive/message.php?msg_name=487CDF51.5060201%40endian.com\n\n\n\"Afterwards it retries in a loop. This retry loop is infinite, due to a \nnot initialised variable.\nThis happens also only if you use a parent proxy and if the parent proxy \nis a numerical ip address, which don't need to be resolved.\"",
"descriptions": [
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -115,6 +137,7 @@
"url": "http://www.server-side.de/index.htm",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Product"
]
},

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-0949",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-06-09T17:30:00.657",
"lastModified": "2023-12-28T15:21:37.460",
"lastModified": "2024-02-09T00:17:23.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-476"
"value": "CWE-908"
}
]
}
@ -184,6 +184,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C3243C77-D635-480D-908C-328A479719E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
"matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B"
}
]
}
]
}
],
"references": [
@ -275,6 +300,7 @@
"url": "http://www.debian.org/security/2009/dsa-1811",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-2523",
"sourceIdentifier": "secure@microsoft.com",
"published": "2009-11-11T19:30:00.407",
"lastModified": "2019-04-30T14:27:13.913",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:24:53.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,11 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
@ -75,16 +79,25 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA09-314A.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-064",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6300",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-3620",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-10-22T16:00:00.577",
"lastModified": "2023-11-03T17:13:57.820",
"lastModified": "2024-02-09T00:20:34.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -71,6 +71,10 @@
{
"lang": "en",
"value": "CWE-476"
},
{
"lang": "en",
"value": "CWE-908"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9805",
"sourceIdentifier": "security@mozilla.org",
"published": "2019-04-26T17:29:03.523",
"lastModified": "2020-08-24T17:37:01.140",
"lastModified": "2024-02-08T23:43:00.703",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -99,7 +99,6 @@
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-20739",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-11-20T19:15:11.710",
"lastModified": "2023-11-07T03:19:42.137",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T23:50:31.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-908"
"value": "CWE-909"
}
]
}
@ -107,6 +107,21 @@
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956"
}
]
}
]
},
{
"nodes": [
{
@ -128,8 +143,7 @@
"url": "https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
@ -137,8 +151,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
"Issue Tracking"
]
},
{
@ -151,7 +164,11 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZULVPQQ4QDFSQCXFYBUXEM7UXJAOKLSP/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1782",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-04-02T18:15:21.373",
"lastModified": "2021-04-09T18:08:49.047",
"lastModified": "2024-02-09T00:41:25.647",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple iOS Privilege Escalation and Code Execution Chain",
"cisaVulnerabilityName": "Apple Multiple Products Race Condition Vulnerability",
"descriptions": [
{
"lang": "en",
@ -74,11 +74,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-362"
"value": "CWE-667"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-0931",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-08T23:15:09.470",
"lastModified": "2024-02-08T23:15:09.470",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Red Hat Product Security does not consider this to be a vulnerability. Upstream has not acknowledged this issue as a security flaw."
}
],
"metrics": {},
"references": []
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-36349",
"sourceIdentifier": "secure@intel.com",
"published": "2022-11-11T16:15:15.447",
"lastModified": "2022-11-16T16:57:40.863",
"lastModified": "2024-02-09T00:12:08.327",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": "La inicializaci\u00f3n variable predeterminada insegura en el firmware del BIOS para Intel(R) NUC Boards y Intel(R) NUC Kits anteriores a la versi\u00f3n MYi30060 puede permitir que un usuario autenticado habilite potencialmente la Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s del acceso local."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40084",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.130",
"lastModified": "2023-12-22T01:15:10.193",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:24:31.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/system/netd/+/1b8bddd96b2efd4074b6d4eee377b62077c031bd",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40087",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.177",
"lastModified": "2023-12-22T01:15:10.270",
"vulnStatus": "Modified",
"lastModified": "2024-02-09T00:23:21.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/243fdf1c0d53bda9e829b4bec9f7c2a824b4d3d1",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40262",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.683",
"lastModified": "2024-02-08T23:15:09.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows unauthenticated Stored Cross-Site Scripting (XSS) in the administration component via Access Request."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2305-02.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40263",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.730",
"lastModified": "2024-02-08T23:15:09.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows authenticated command injection via ftp."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2305-02.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40264",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.773",
"lastModified": "2024-02-08T23:15:09.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows authenticated path traversal in the user interface."
}
],
"metrics": {},
"references": [
{
"url": "https://networks.unify.com/security/advisories/OBSO-2305-02.pdf",
"source": "cve@mitre.org"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43516",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:16:01.307",
"lastModified": "2024-02-06T13:53:38.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-09T00:50:24.280",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,10 +38,243 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43517",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-02-06T06:16:01.467",
"lastModified": "2024-02-06T13:53:38.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-09T00:51:20.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -38,10 +58,540 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin",
"source": "product-security@qualcomm.com"
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-47131",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.827",
"lastModified": "2024-02-08T23:15:09.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The N-able PassPortal extension before 3.29.2 for Chrome inserts sensitive information into a log file."
}
],
"metrics": {},
"references": [
{
"url": "https://me.n-able.com/s/security-advisory/aArHs000000M8CCKA0/cve202347131-passportal-browser-extension-logs-sensitive-data",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-47132",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T23:15:09.877",
"lastModified": "2024-02-08T23:15:09.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in N-able N-central before 2023.6 and earlier allows attackers to gain escalated privileges via API calls."
}
],
"metrics": {},
"references": [
{
"url": "https://me.n-able.com/s/security-advisory/aArHs000000M8CHKA0/cve202347132-ncentral-api-privilege-escalation",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51630",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-02-08T23:15:09.933",
"lastModified": "2024-02-08T23:15:09.933",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system.\n. Was ZDI-CAN-21182."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-073/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-24820",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:08.437",
"lastModified": "2024-02-09T00:15:08.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86",
"source": "security-advisories@github.com"
},
{
"url": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0",
"source": "security-advisories@github.com"
},
{
"url": "https://www.chromium.org/updates/same-site/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-24821",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:08.680",
"lastModified": "2024-02-09T00:15:08.680",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Composer is a dependency Manager for the PHP language. In affected versions several files within the local working directory are included during the invocation of Composer and in the context of the executing user. As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files. All Composer CLI commands are affected, including composer.phar's self-update. The following scenarios are of high risk: Composer being run with sudo, Pipelines which may execute Composer on untrusted projects, Shared environments with developers who run Composer individually on the same project. This vulnerability has been addressed in versions 2.7.0 and 2.2.23. It is advised that the patched versions are applied at the earliest convenience. Where not possible, the following should be addressed: Remove all sudo composer privileges for all users to mitigate root privilege escalation, and avoid running Composer within an untrusted directory, or if needed, verify that the contents of `vendor/composer/InstalledVersions.php` and `vendor/composer/installed.php` do not include untrusted code. A reset can also be done on these files by the following:```sh\nrm vendor/composer/installed.php vendor/composer/InstalledVersions.php\ncomposer install --no-scripts --no-plugins\n```"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://github.com/composer/composer/commit/64e4eb356b159a30c766cd1ea83450a38dc23bf5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/composer/composer/security/advisories/GHSA-7c6p-848j-wh5h",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-24825",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:08.903",
"lastModified": "2024-02-09T00:15:08.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "DIRAC is a distributed resource framework. In affected versions any user could get a token that has been requested by another user/agent. This may expose resources to unintended parties. This issue has been addressed in release version 8.0.37. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/DIRACGrid/DIRAC/commit/f9ddab755b9a69acb85e14d2db851d8ac0c9648c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/DIRACGrid/DIRAC/security/advisories/GHSA-59qj-jcjv-662j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-24829",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-09T00:15:09.117",
"lastModified": "2024-02-09T00:15:09.117",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Sentry is an error tracking and performance monitoring platform. Sentry\u2019s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/pull/64882",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-24830",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-08T23:15:10.153",
"lastModified": "2024-02-08T23:15:10.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OpenObserve is a observability platform built specifically for logs, metrics, traces, analytics, designed to work at petabyte scale. A vulnerability has been identified in the \"/api/{org_id}/users\" endpoint. This vulnerability allows any authenticated regular user ('member') to add new users with elevated privileges, including the 'root' role, to an organization. This issue circumvents the intended security controls for role assignments. The vulnerability resides in the user creation process, where the payload does not validate the user roles. A regular user can manipulate the payload to assign root-level privileges. This vulnerability leads to Unauthorized Privilege Escalation and significantly compromises the application's role-based access control system. It allows unauthorized control over application resources and poses a risk to data security. All users, particularly those in administrative roles, are impacted. This issue has been addressed in release version 0.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-272"
},
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-25106",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-08T23:15:10.360",
"lastModified": "2024-02-08T23:15:10.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OpenObserve is a observability platform built specifically for logs, metrics, traces, analytics, designed to work at petabyte scale. A critical vulnerability has been identified in the \"/api/{org_id}/users/{email_id}\" endpoint. This vulnerability allows any authenticated user within an organization to remove any other user from that same organization, irrespective of their respective roles. This includes the ability to remove users with \"Admin\" and \"Root\" roles. By enabling any organizational member to unilaterally alter the user base, it opens the door to unauthorized access and can cause considerable disruptions in operations. The core of the vulnerability lies in the `remove_user_from_org` function in the user management system. This function is designed to allow organizational users to remove members from their organization. The function does not check if the user initiating the request has the appropriate administrative privileges to remove a user. Any user who is part of the organization, irrespective of their role, can remove any other user, including those with higher privileges. This vulnerability is categorized as an Authorization issue leading to Unauthorized User Removal. The impact is severe, as it compromises the integrity of user management within organizations. By exploiting this vulnerability, any user within an organization, without the need for administrative privileges, can remove critical users, including \"Admins\" and \"Root\" users. This could result in unauthorized system access, administrative lockout, or operational disruptions. Given that user accounts are typically created by \"Admins\" or \"Root\" users, this vulnerability can be exploited by any user who has been granted access to an organization, thereby posing a critical risk to the security and operational stability of the application. This issue has been addressed in release version 0.8.0. Users are advised to upgrade."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-272"
},
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-25107",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-08T23:15:10.583",
"lastModified": "2024-02-08T23:15:10.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "WikiDiscover is an extension designed for use with a CreateWiki managed farm to display wikis. On Special:WikiDiscover, the `Language::date` function is used when making the human-readable timestamp for inclusion on the wiki_creation column. This function uses interface messages to translate the names of months and days. It uses the `->text()` output mode, returning unescaped interface messages. Since the output is not escaped later, the unescaped interface message is included on the output, resulting in an XSS vulnerability. Exploiting this on-wiki requires the `(editinterface)` right. This vulnerability has been addressed in commit `267e763a0`. Users are advised to update their installations. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/miraheze/WikiDiscover/commit/267e763a0d7460f001693c42f67717a0fc3fd6bb",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/miraheze/WikiDiscover/security/advisories/GHSA-cfcf-94jv-455f",
"source": "security-advisories@github.com"
},
{
"url": "https://issue-tracker.miraheze.org/T11814",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-08T23:00:25.349053+00:00
2024-02-09T00:55:15.040763+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-08T22:23:50.630000+00:00
2024-02-09T00:52:17.807000+00:00
```
### Last Data Feed Release
@ -29,57 +29,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
237979
237993
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `14`
* [CVE-2023-25365](CVE-2023/CVE-2023-253xx/CVE-2023-25365.json) (`2024-02-08T22:15:08.410`)
* [CVE-2023-27001](CVE-2023/CVE-2023-270xx/CVE-2023-27001.json) (`2024-02-08T22:15:08.463`)
* [CVE-2023-40265](CVE-2023/CVE-2023-402xx/CVE-2023-40265.json) (`2024-02-08T22:15:08.770`)
* [CVE-2023-40266](CVE-2023/CVE-2023-402xx/CVE-2023-40266.json) (`2024-02-08T22:15:08.840`)
* [CVE-2023-49101](CVE-2023/CVE-2023-491xx/CVE-2023-49101.json) (`2024-02-08T22:15:08.940`)
* [CVE-2024-23756](CVE-2024/CVE-2024-237xx/CVE-2024-23756.json) (`2024-02-08T21:15:08.380`)
* [CVE-2024-24494](CVE-2024/CVE-2024-244xx/CVE-2024-24494.json) (`2024-02-08T21:15:08.437`)
* [CVE-2024-24495](CVE-2024/CVE-2024-244xx/CVE-2024-24495.json) (`2024-02-08T21:15:08.490`)
* [CVE-2024-24496](CVE-2024/CVE-2024-244xx/CVE-2024-24496.json) (`2024-02-08T21:15:08.537`)
* [CVE-2024-24497](CVE-2024/CVE-2024-244xx/CVE-2024-24497.json) (`2024-02-08T21:15:08.590`)
* [CVE-2024-24498](CVE-2024/CVE-2024-244xx/CVE-2024-24498.json) (`2024-02-08T21:15:08.640`)
* [CVE-2024-24499](CVE-2024/CVE-2024-244xx/CVE-2024-24499.json) (`2024-02-08T21:15:08.693`)
* [CVE-2024-24393](CVE-2024/CVE-2024-243xx/CVE-2024-24393.json) (`2024-02-08T22:15:09.130`)
* [CVE-2022-0931](CVE-2022/CVE-2022-09xx/CVE-2022-0931.json) (`2024-02-08T23:15:09.470`)
* [CVE-2023-40262](CVE-2023/CVE-2023-402xx/CVE-2023-40262.json) (`2024-02-08T23:15:09.683`)
* [CVE-2023-40263](CVE-2023/CVE-2023-402xx/CVE-2023-40263.json) (`2024-02-08T23:15:09.730`)
* [CVE-2023-40264](CVE-2023/CVE-2023-402xx/CVE-2023-40264.json) (`2024-02-08T23:15:09.773`)
* [CVE-2023-47131](CVE-2023/CVE-2023-471xx/CVE-2023-47131.json) (`2024-02-08T23:15:09.827`)
* [CVE-2023-47132](CVE-2023/CVE-2023-471xx/CVE-2023-47132.json) (`2024-02-08T23:15:09.877`)
* [CVE-2023-51630](CVE-2023/CVE-2023-516xx/CVE-2023-51630.json) (`2024-02-08T23:15:09.933`)
* [CVE-2024-24830](CVE-2024/CVE-2024-248xx/CVE-2024-24830.json) (`2024-02-08T23:15:10.153`)
* [CVE-2024-25106](CVE-2024/CVE-2024-251xx/CVE-2024-25106.json) (`2024-02-08T23:15:10.360`)
* [CVE-2024-25107](CVE-2024/CVE-2024-251xx/CVE-2024-25107.json) (`2024-02-08T23:15:10.583`)
* [CVE-2024-24820](CVE-2024/CVE-2024-248xx/CVE-2024-24820.json) (`2024-02-09T00:15:08.437`)
* [CVE-2024-24821](CVE-2024/CVE-2024-248xx/CVE-2024-24821.json) (`2024-02-09T00:15:08.680`)
* [CVE-2024-24825](CVE-2024/CVE-2024-248xx/CVE-2024-24825.json) (`2024-02-09T00:15:08.903`)
* [CVE-2024-24829](CVE-2024/CVE-2024-248xx/CVE-2024-24829.json) (`2024-02-09T00:15:09.117`)
### CVEs modified in the last Commit
Recently modified CVEs: `27`
* [CVE-2023-43534](CVE-2023/CVE-2023-435xx/CVE-2023-43534.json) (`2024-02-08T21:17:05.153`)
* [CVE-2023-43533](CVE-2023/CVE-2023-435xx/CVE-2023-43533.json) (`2024-02-08T21:17:59.437`)
* [CVE-2023-43532](CVE-2023/CVE-2023-435xx/CVE-2023-43532.json) (`2024-02-08T21:19:44.773`)
* [CVE-2023-43522](CVE-2023/CVE-2023-435xx/CVE-2023-43522.json) (`2024-02-08T21:59:52.547`)
* [CVE-2023-43520](CVE-2023/CVE-2023-435xx/CVE-2023-43520.json) (`2024-02-08T22:00:42.790`)
* [CVE-2023-43519](CVE-2023/CVE-2023-435xx/CVE-2023-43519.json) (`2024-02-08T22:08:33.677`)
* [CVE-2023-33065](CVE-2023/CVE-2023-330xx/CVE-2023-33065.json) (`2024-02-08T22:10:10.700`)
* [CVE-2023-30559](CVE-2023/CVE-2023-305xx/CVE-2023-30559.json) (`2024-02-08T22:15:08.523`)
* [CVE-2023-47022](CVE-2023/CVE-2023-470xx/CVE-2023-47022.json) (`2024-02-08T22:15:08.897`)
* [CVE-2023-5366](CVE-2023/CVE-2023-53xx/CVE-2023-5366.json) (`2024-02-08T22:15:08.993`)
* [CVE-2023-33067](CVE-2023/CVE-2023-330xx/CVE-2023-33067.json) (`2024-02-08T22:18:01.073`)
* [CVE-2023-33068](CVE-2023/CVE-2023-330xx/CVE-2023-33068.json) (`2024-02-08T22:18:32.903`)
* [CVE-2023-33069](CVE-2023/CVE-2023-330xx/CVE-2023-33069.json) (`2024-02-08T22:19:01.727`)
* [CVE-2023-33072](CVE-2023/CVE-2023-330xx/CVE-2023-33072.json) (`2024-02-08T22:21:49.550`)
* [CVE-2023-33076](CVE-2023/CVE-2023-330xx/CVE-2023-33076.json) (`2024-02-08T22:23:06.457`)
* [CVE-2023-33077](CVE-2023/CVE-2023-330xx/CVE-2023-33077.json) (`2024-02-08T22:23:50.630`)
* [CVE-2024-22795](CVE-2024/CVE-2024-227xx/CVE-2024-22795.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-23764](CVE-2024/CVE-2024-237xx/CVE-2024-23764.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-24215](CVE-2024/CVE-2024-242xx/CVE-2024-24215.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-0242](CVE-2024/CVE-2024-02xx/CVE-2024-0242.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-1329](CVE-2024/CVE-2024-13xx/CVE-2024-1329.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-22836](CVE-2024/CVE-2024-228xx/CVE-2024-22836.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-23660](CVE-2024/CVE-2024-236xx/CVE-2024-23660.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-24115](CVE-2024/CVE-2024-241xx/CVE-2024-24115.json) (`2024-02-08T21:03:22.000`)
* [CVE-2024-24806](CVE-2024/CVE-2024-248xx/CVE-2024-24806.json) (`2024-02-08T22:15:09.200`)
* [CVE-2005-1036](CVE-2005/CVE-2005-10xx/CVE-2005-1036.json) (`2024-02-08T23:47:27.637`)
* [CVE-2005-2456](CVE-2005/CVE-2005-24xx/CVE-2005-2456.json) (`2024-02-09T00:44:12.917`)
* [CVE-2007-3749](CVE-2007/CVE-2007-37xx/CVE-2007-3749.json) (`2024-02-09T00:35:32.037`)
* [CVE-2008-0081](CVE-2008/CVE-2008-00xx/CVE-2008-0081.json) (`2024-02-08T23:42:31.667`)
* [CVE-2008-2934](CVE-2008/CVE-2008-29xx/CVE-2008-2934.json) (`2024-02-08T23:43:34.487`)
* [CVE-2008-3688](CVE-2008/CVE-2008-36xx/CVE-2008-3688.json) (`2024-02-08T23:44:44.063`)
* [CVE-2008-3475](CVE-2008/CVE-2008-34xx/CVE-2008-3475.json) (`2024-02-08T23:46:51.967`)
* [CVE-2008-0063](CVE-2008/CVE-2008-00xx/CVE-2008-0063.json) (`2024-02-09T00:35:55.777`)
* [CVE-2008-0062](CVE-2008/CVE-2008-00xx/CVE-2008-0062.json) (`2024-02-09T00:42:52.807`)
* [CVE-2009-2692](CVE-2009/CVE-2009-26xx/CVE-2009-2692.json) (`2024-02-08T23:50:03.097`)
* [CVE-2009-0949](CVE-2009/CVE-2009-09xx/CVE-2009-0949.json) (`2024-02-09T00:17:23.450`)
* [CVE-2009-3620](CVE-2009/CVE-2009-36xx/CVE-2009-3620.json) (`2024-02-09T00:20:34.557`)
* [CVE-2009-2523](CVE-2009/CVE-2009-25xx/CVE-2009-2523.json) (`2024-02-09T00:24:53.217`)
* [CVE-2009-0935](CVE-2009/CVE-2009-09xx/CVE-2009-0935.json) (`2024-02-09T00:39:40.193`)
* [CVE-2019-9805](CVE-2019/CVE-2019-98xx/CVE-2019-9805.json) (`2024-02-08T23:43:00.703`)
* [CVE-2020-20739](CVE-2020/CVE-2020-207xx/CVE-2020-20739.json) (`2024-02-08T23:50:31.537`)
* [CVE-2021-1782](CVE-2021/CVE-2021-17xx/CVE-2021-1782.json) (`2024-02-09T00:41:25.647`)
* [CVE-2022-36349](CVE-2022/CVE-2022-363xx/CVE-2022-36349.json) (`2024-02-09T00:12:08.327`)
* [CVE-2023-40087](CVE-2023/CVE-2023-400xx/CVE-2023-40087.json) (`2024-02-09T00:23:21.477`)
* [CVE-2023-40084](CVE-2023/CVE-2023-400xx/CVE-2023-40084.json) (`2024-02-09T00:24:31.993`)
* [CVE-2023-43513](CVE-2023/CVE-2023-435xx/CVE-2023-43513.json) (`2024-02-09T00:49:48.173`)
* [CVE-2023-43516](CVE-2023/CVE-2023-435xx/CVE-2023-43516.json) (`2024-02-09T00:50:24.280`)
* [CVE-2023-43517](CVE-2023/CVE-2023-435xx/CVE-2023-43517.json) (`2024-02-09T00:51:20.140`)
* [CVE-2023-43518](CVE-2023/CVE-2023-435xx/CVE-2023-43518.json) (`2024-02-09T00:51:42.733`)
* [CVE-2023-43523](CVE-2023/CVE-2023-435xx/CVE-2023-43523.json) (`2024-02-09T00:52:17.807`)
## Download and Usage