From 55e06cbc6ff706d5638d8b8884f147bd7c060f4c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 1 Feb 2024 03:00:30 +0000 Subject: [PATCH] Auto-Update: 2024-02-01T03:00:27.227157+00:00 --- CVE-2008/CVE-2008-05xx/CVE-2008-0595.json | 69 +- CVE-2013/CVE-2013-45xx/CVE-2013-4587.json | 1509 ++----------------- CVE-2019/CVE-2019-194xx/CVE-2019-19450.json | 27 +- CVE-2020/CVE-2020-119xx/CVE-2020-11987.json | 85 +- CVE-2020/CVE-2020-357xx/CVE-2020-35745.json | 10 +- CVE-2020/CVE-2020-53xx/CVE-2020-5330.json | 11 +- CVE-2022/CVE-2022-23xx/CVE-2022-2320.json | 4 +- CVE-2022/CVE-2022-276xx/CVE-2022-27665.json | 9 +- CVE-2022/CVE-2022-295xx/CVE-2022-29532.json | 15 +- CVE-2022/CVE-2022-295xx/CVE-2022-29534.json | 15 +- CVE-2022/CVE-2022-364xx/CVE-2022-36440.json | 83 +- CVE-2022/CVE-2022-403xx/CVE-2022-40302.json | 44 +- CVE-2022/CVE-2022-413xx/CVE-2022-41352.json | 9 +- CVE-2022/CVE-2022-486xx/CVE-2022-48618.json | 6 +- CVE-2023/CVE-2023-14xx/CVE-2023-1437.json | 4 +- CVE-2023/CVE-2023-15xx/CVE-2023-1503.json | 24 +- CVE-2023/CVE-2023-15xx/CVE-2023-1504.json | 22 +- CVE-2023/CVE-2023-20xx/CVE-2023-2007.json | 196 ++- CVE-2023/CVE-2023-21xx/CVE-2023-2124.json | 192 ++- CVE-2023/CVE-2023-220xx/CVE-2023-22025.json | 34 +- CVE-2023/CVE-2023-220xx/CVE-2023-22067.json | 34 +- CVE-2023/CVE-2023-220xx/CVE-2023-22074.json | 11 +- CVE-2023/CVE-2023-22xx/CVE-2023-2269.json | 216 ++- CVE-2023/CVE-2023-275xx/CVE-2023-27500.json | 16 +- CVE-2023/CVE-2023-28xx/CVE-2023-2898.json | 192 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31100.json | 18 +- CVE-2023/CVE-2023-314xx/CVE-2023-31419.json | 9 +- CVE-2023/CVE-2023-340xx/CVE-2023-34058.json | 50 +- CVE-2023/CVE-2023-34xx/CVE-2023-3431.json | 25 +- CVE-2023/CVE-2023-34xx/CVE-2023-3432.json | 25 +- CVE-2023/CVE-2023-380xx/CVE-2023-38039.json | 79 +- CVE-2023/CVE-2023-385xx/CVE-2023-38524.json | 26 +- CVE-2023/CVE-2023-398xx/CVE-2023-39854.json | 4 +- CVE-2023/CVE-2023-436xx/CVE-2023-43616.json | 10 +- CVE-2023/CVE-2023-441xx/CVE-2023-44109.json | 4 +- CVE-2023/CVE-2023-465xx/CVE-2023-46595.json | 22 +- CVE-2023/CVE-2023-467xx/CVE-2023-46747.json | 50 +- CVE-2023/CVE-2023-467xx/CVE-2023-46748.json | 32 +- CVE-2023/CVE-2023-50xx/CVE-2023-5048.json | 8 +- CVE-2023/CVE-2023-50xx/CVE-2023-5084.json | 11 +- CVE-2023/CVE-2023-54xx/CVE-2023-5467.json | 22 +- CVE-2024/CVE-2024-08xx/CVE-2024-0831.json | 59 + CVE-2024/CVE-2024-218xx/CVE-2024-21893.json | 6 +- README.md | 57 +- 44 files changed, 1727 insertions(+), 1627 deletions(-) create mode 100644 CVE-2024/CVE-2024-08xx/CVE-2024-0831.json diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0595.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0595.json index 30dea02e576..900bf670ab2 100644 --- a/CVE-2008/CVE-2008-05xx/CVE-2008-0595.json +++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0595.json @@ -2,7 +2,7 @@ "id": "CVE-2008-0595", "sourceIdentifier": "secalert@redhat.com", "published": "2008-02-29T19:44:00.000", - "lastModified": "2022-02-07T18:24:52.113", + "lastModified": "2024-02-01T02:08:41.343", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,8 +82,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86-64:*:*:*:*:*", - "matchCriteriaId": "E7388F51-0BD2-4953-9B62-6E9C3C8EC6D2" + "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:*", + "matchCriteriaId": "316AA6EB-7191-479E-99D5-40DA79E340E7" }, { "vulnerable": true, @@ -92,8 +92,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*", - "matchCriteriaId": "E1EA333D-4BA5-476E-AD50-2041C3B37600" + "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86_64:*:*:*:*:*", + "matchCriteriaId": "5FE8C9E7-15C3-4F89-8E54-C9691FAD4E4C" }, { "vulnerable": true, @@ -156,6 +156,62 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/29148", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/29160", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/29171", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/29173", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/29281", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/29323", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/30869", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/32281", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securitytracker.com/id?1019512", "source": "secalert@redhat.com", @@ -210,6 +266,7 @@ "url": "http://www.securityfocus.com/archive/1/489280/100/0/threaded", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -248,7 +305,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9353", "source": "secalert@redhat.com", "tags": [ - "Tool Signature" + "Broken Link" ] }, { diff --git a/CVE-2013/CVE-2013-45xx/CVE-2013-4587.json b/CVE-2013/CVE-2013-45xx/CVE-2013-4587.json index b4c686359d3..6eb1f0e27b0 100644 --- a/CVE-2013/CVE-2013-45xx/CVE-2013-4587.json +++ b/CVE-2013/CVE-2013-45xx/CVE-2013-4587.json @@ -2,8 +2,8 @@ "id": "CVE-2013-4587", "sourceIdentifier": "secalert@redhat.com", "published": "2013-12-14T18:08:45.590", - "lastModified": "2023-02-13T04:48:01.333", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:40:39.360", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,1393 +63,54 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.12.5", - "matchCriteriaId": "AEE329D0-23A3-4E91-9A33-E14415E60BA7" + "versionEndExcluding": "3.2.54", + "matchCriteriaId": "331E4B5F-B942-476E-95A1-C1DABD2E35F3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.75", + "matchCriteriaId": "E503EA34-7432-4DF4-880C-00AF31FCB9EB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.25", + "matchCriteriaId": "C4DF5075-34BB-489C-A410-753A4F6EA2BE" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", - "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", - "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2422AC23-8410-4524-A733-25E4ABC7515D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB" - }, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.12.6", + "matchCriteriaId": "81EE7BBD-B11B-4AEB-8E24-A18ACE179099" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258" + "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46" + "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" } ] } @@ -1459,71 +120,135 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338c7dbadd2671189cec7faf64c84d01071b3f96", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/12/12/12", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2109-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2110-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2113-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2117-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2128-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2129-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2135-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2136-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2138-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2139-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2141-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1030986", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/torvalds/linux/commit/338c7dbadd2671189cec7faf64c84d01071b3f96", @@ -1534,7 +259,11 @@ }, { "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.54", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json b/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json index 6374ea4f1e8..3d7dff2abf7 100644 --- a/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json +++ b/CVE-2019/CVE-2019-194xx/CVE-2019-19450.json @@ -2,8 +2,8 @@ "id": "CVE-2019-19450", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-20T14:15:12.310", - "lastModified": "2023-09-29T22:15:10.127", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:08:27.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,7 +11,7 @@ }, { "lang": "es", - "value": "paraparser en ReportLab anterior a 3.5.31 permite la ejecuci\u00f3n remota de c\u00f3digo porque start_unichar en paraparser.py eval\u00faa la entrada de un usuario que no es de confianza en un elemento unichar en un documento XML dise\u00f1ado con '" + "value": "paraparser en ReportLab anterior a 3.5.31 permite la ejecuci\u00f3n remota de c\u00f3digo porque start_unichar en paraparser.py eval\u00faa la entrada de un usuario que no es de confianza en un elemento unichar en un documento XML manipulado con '" } ], "metrics": { @@ -66,6 +66,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -78,7 +93,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00037.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://pastebin.com/5MicRrr4", diff --git a/CVE-2020/CVE-2020-119xx/CVE-2020-11987.json b/CVE-2020/CVE-2020-119xx/CVE-2020-11987.json index 73883aca9bc..fdecb86c8f4 100644 --- a/CVE-2020/CVE-2020-119xx/CVE-2020-11987.json +++ b/CVE-2020/CVE-2020-119xx/CVE-2020-11987.json @@ -2,8 +2,8 @@ "id": "CVE-2020-11987", "sourceIdentifier": "security@apache.org", "published": "2021-02-24T18:15:11.093", - "lastModified": "2024-01-07T11:15:09.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:24:46.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -122,6 +122,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "80C9DBB8-3D50-4D5D-859A-B022EB7C2E64" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:banking_apis:18.3:*:*:*:*:*:*:*", @@ -231,6 +236,11 @@ "versionEndIncluding": "11.3.1", "matchCriteriaId": "8E883986-13DA-470F-95C4-BEBD0EDFEB9C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7F978162-CB2C-4166-947A-9048C6E878BC" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*", @@ -265,6 +275,36 @@ "vulnerable": true, "criteria": "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDB925C6-2CBC-4D88-B9EA-F246F4F7A206" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" } ] } @@ -274,27 +314,50 @@ "references": [ { "url": "https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2%40%3Cdev.poi.apache.org%3E", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05%40%3Cdev.poi.apache.org%3E", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEDID4DAVPECE6O4QQCSIS75BLLBUUAM/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-11", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com//security-alerts/cpujul2021.html", @@ -322,7 +385,11 @@ }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", diff --git a/CVE-2020/CVE-2020-357xx/CVE-2020-35745.json b/CVE-2020/CVE-2020-357xx/CVE-2020-35745.json index d62d3f51096..3ccb9176e0a 100644 --- a/CVE-2020/CVE-2020-357xx/CVE-2020-35745.json +++ b/CVE-2020/CVE-2020-357xx/CVE-2020-35745.json @@ -2,8 +2,8 @@ "id": "CVE-2020-35745", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-07T21:15:13.120", - "lastModified": "2023-11-14T16:21:41.177", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:22:20.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,7 +95,11 @@ "references": [ { "url": "https://medium.com/%40ashketchum/privilege-escalation-unauthenticated-access-to-admin-portal-cve-2020-35745-bb5d5dca97a0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.phpgurukul.com/hospital-management-system-in-php/", diff --git a/CVE-2020/CVE-2020-53xx/CVE-2020-5330.json b/CVE-2020/CVE-2020-53xx/CVE-2020-5330.json index c2f0730290f..b87dc09df48 100644 --- a/CVE-2020/CVE-2020-53xx/CVE-2020-5330.json +++ b/CVE-2020/CVE-2020-53xx/CVE-2020-5330.json @@ -2,8 +2,8 @@ "id": "CVE-2020-5330", "sourceIdentifier": "security_alert@emc.com", "published": "2020-04-10T19:15:13.413", - "lastModified": "2023-04-06T17:15:08.913", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:28:54.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -250,7 +250,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/171723/Cisco-Dell-Netgear-Information-Disclosure-Hash-Decrypter.html", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dell.com/support/article/en-us/sln320366/dsa-2020-042-dell-emc-networking-security-update-for-an-information-disclosure-vulnerability?lang=en", diff --git a/CVE-2022/CVE-2022-23xx/CVE-2022-2320.json b/CVE-2022/CVE-2022-23xx/CVE-2022-2320.json index 9217e09609b..e836da97792 100644 --- a/CVE-2022/CVE-2022-23xx/CVE-2022-2320.json +++ b/CVE-2022/CVE-2022-23xx/CVE-2022-2320.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2320", "sourceIdentifier": "secalert@redhat.com", "published": "2022-09-01T21:15:09.443", - "lastModified": "2023-02-12T22:15:26.947", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:27:14.940", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json b/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json index 82f25bde13e..e8462aa39f2 100644 --- a/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json +++ b/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27665", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T14:15:07.327", - "lastModified": "2023-10-11T14:45:44.747", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:04:14.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -66,7 +66,10 @@ "references": [ { "url": "https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://docs.ipswitch.com/WS_FTP_Server2020/ReleaseNotes/index.htm", diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29532.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29532.json index 3c53d82d257..1e708b6ade3 100644 --- a/CVE-2022/CVE-2022-295xx/CVE-2022-29532.json +++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29532.json @@ -2,8 +2,8 @@ "id": "CVE-2022-29532", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-20T23:15:08.597", - "lastModified": "2023-10-30T22:15:09.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:15:39.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -112,11 +112,18 @@ }, { "url": "https://zigrin.com/advisories/misp-xss-in-the-cerebrate-view/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29534.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29534.json index 98256858b3a..68f6f195a53 100644 --- a/CVE-2022/CVE-2022-295xx/CVE-2022-29534.json +++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29534.json @@ -2,8 +2,8 @@ "id": "CVE-2022-29534", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-20T23:15:08.687", - "lastModified": "2023-10-30T22:15:09.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:19:49.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -112,11 +112,18 @@ }, { "url": "https://zigrin.com/advisories/misp-password-confirmation-can-be-bypassed/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://zigrin.com/cakephp-application-cybersecurity-research-the-impact-of-a-php-vulnerability-exploring-the-password-confirmation-bypass-in-misp/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-364xx/CVE-2022-36440.json b/CVE-2022/CVE-2022-364xx/CVE-2022-36440.json index f272a4969a9..610efb789b6 100644 --- a/CVE-2022/CVE-2022-364xx/CVE-2022-36440.json +++ b/CVE-2022/CVE-2022-364xx/CVE-2022-36440.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36440", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T16:15:07.287", - "lastModified": "2023-11-07T03:49:38.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:11:30.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -65,6 +65,56 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", + "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] } ], "references": [ @@ -85,23 +135,42 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GM66PNHGCXZU66LQCTP2FSJLFF6CVMSI/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5495", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-403xx/CVE-2022-40302.json b/CVE-2022/CVE-2022-403xx/CVE-2022-40302.json index 3119db143a7..4d3a51048d9 100644 --- a/CVE-2022/CVE-2022-403xx/CVE-2022-40302.json +++ b/CVE-2022/CVE-2022-403xx/CVE-2022-40302.json @@ -2,12 +2,16 @@ "id": "CVE-2022-40302", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-03T12:16:27.423", - "lastModified": "2023-09-19T22:15:11.020", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:12:52.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en bgpd en FRRouting (FRR) a trav\u00e9s de 8.4. Al crear un mensaje BGP OPEN con una opci\u00f3n de tipo 0xff (longitud extendida de RFC 9072), los atacantes pueden provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y reinicio del servicio, o lectura fuera de los l\u00edmites). Esto es posible debido a comprobaciones de l\u00edmites incoherentes que no tienen en cuenta la lectura de 3 bytes (en lugar de 2) en este caso 0xff." } ], "metrics": { @@ -62,6 +66,31 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] } ], "references": [ @@ -74,11 +103,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5495", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json index 73e334e93e0..45df3774c5f 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41352.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41352", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-26T02:15:10.733", - "lastModified": "2023-10-10T00:15:10.297", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:06:56.070", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2022-10-20", "cisaActionDue": "2022-11-10", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -112,7 +112,10 @@ }, { "url": "https://www.secpod.com/blog/unpatched-rce-bug-in-zimbra-collaboration-suite-exploited-in-wild/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json index f840d666fd4..47a8cdd3c24 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48618.json @@ -2,8 +2,12 @@ "id": "CVE-2022-48618", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-09T18:15:45.120", - "lastModified": "2024-01-16T18:37:05.433", + "lastModified": "2024-02-01T02:00:01.187", "vulnStatus": "Analyzed", + "cisaExploitAdd": "2024-01-31", + "cisaActionDue": "2024-02-21", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Apple Multiple Products Improper Authentication Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json index 2ba99405f1c..a3023180276 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1437", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-08-02T23:15:10.153", - "lastModified": "2023-10-11T15:15:09.400", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T00:57:56.540", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json index 03909c2d491..bd1d3f4ffea 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1503", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-20T09:15:12.267", - "lastModified": "2023-11-07T04:03:58.487", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:44:58.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,23 +17,23 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.2, "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,8 +81,8 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", - "type": "Primary", + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -113,6 +113,7 @@ "url": "https://vuldb.com/?ctiid.223407", "source": "cna@vuldb.com", "tags": [ + "Broken Link", "Exploit", "Third Party Advisory" ] @@ -121,6 +122,7 @@ "url": "https://vuldb.com/?id.223407", "source": "cna@vuldb.com", "tags": [ + "Broken Link", "Exploit", "Third Party Advisory" ] diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json index a865ac00d4c..7670d52f194 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1504", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-20T09:15:12.410", - "lastModified": "2023-11-07T04:03:59.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T02:00:08.550", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,23 +17,23 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.1, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.2, "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,8 +81,8 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", - "type": "Primary", + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json index fe915351d30..de8a93dd0f6 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2007", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-24T23:15:18.877", - "lastModified": "2024-01-19T16:15:08.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:39:22.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,6 +72,176 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E" + } + ] + } + ] } ], "references": [ @@ -84,19 +254,33 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240119-0011/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json index cfb5df6aec4..788ca071435 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2124", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-15T22:15:12.150", - "lastModified": "2023-10-20T00:15:12.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:35:35.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -66,8 +66,163 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "6.3", - "matchCriteriaId": "DB688D87-8482-4514-9659-6AF409C43C3D" + "versionEndExcluding": "6.4", + "matchCriteriaId": "18D12E25-2947-44E7-989D-24450E013A1F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" } ] } @@ -80,28 +235,47 @@ "source": "secalert@redhat.com", "tags": [ "Mailing List", + "Patch", "Vendor Advisory" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230622-0010/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5448", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json index 0dd098c80ed..49b7ffe1bf4 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22025", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:11.837", - "lastModified": "2023-11-08T05:15:08.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T02:11:33.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -100,16 +100,42 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891" + } + ] + } + ] } ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20231027-0006/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5548", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuoct2023.html", diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json index 314a5c5c00e..d1198658226 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22067", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:12.540", - "lastModified": "2023-11-08T05:15:08.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T02:09:52.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -80,16 +80,42 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891" + } + ] + } + ] } ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20231027-0006/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5537", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuoct2023.html", diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json index 02d6aa7dcb4..05a01035355 100644 --- a/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json +++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22074", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-10-17T22:15:13.067", - "lastModified": "2023-10-26T17:15:08.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T02:13:06.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,7 +79,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuoct2023.html", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json index b44ca5d3623..8168bccf960 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2269", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-25T21:15:10.627", - "lastModified": "2023-11-07T04:12:17.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:33:49.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,7 +46,7 @@ ] }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { @@ -96,44 +96,236 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] } ], "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230929-0004/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5448", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27500.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27500.json index 94cbbc1c3de..dcd331909de 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27500.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27500.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27500", "sourceIdentifier": "cna@sap.com", "published": "2023-03-14T06:15:12.100", - "lastModified": "2023-04-11T04:16:06.183", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:32:09.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -56,7 +56,7 @@ }, "weaknesses": [ { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -64,6 +64,16 @@ "value": "CWE-22" } ] + }, + { + "source": "cna@sap.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json index a718f35f3e3..b1a54211995 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2898", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-26T22:15:14.727", - "lastModified": "2023-11-07T04:13:30.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:27:24.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,7 +50,7 @@ ] }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { @@ -75,28 +75,204 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] } ], "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao%40kernel.org/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230929-0002/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5492", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31100.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31100.json index a0cba0b1f4f..c29e2c958c0 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31100.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31100.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31100", "sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de", "published": "2023-11-15T00:15:07.573", - "lastModified": "2023-11-22T15:09:25.920", + "lastModified": "2024-02-01T02:30:22.687", "vulnStatus": "Analyzed", "descriptions": [ { @@ -89,31 +89,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:phoenix:securecore_technology:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.0.0", "versionEndExcluding": "4.3.0.203", - "matchCriteriaId": "7FC7CCE9-9E01-4803-9C1E-FC215B30BBAD" + "matchCriteriaId": "E56DABBE-40F8-4A26-92C6-9506AA426673" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phoenix:securecore_technology:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.3.1.0", "versionEndExcluding": "4.3.1.163", - "matchCriteriaId": "F3A57D34-698E-4379-B8D5-1BA358E243DD" + "matchCriteriaId": "D2466200-7229-4412-83BE-E1B0FC076CCD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phoenix:securecore_technology:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.4.0.0", "versionEndExcluding": "4.4.0.217", - "matchCriteriaId": "65E12C7D-A655-4890-8FDF-0F6DBA9C598D" + "matchCriteriaId": "7AE48D55-B352-497B-9E69-4BE0B0A35865" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phoenix:securecore_technology:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:phoenix:securecore_technology:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.5.0.0", "versionEndExcluding": "4.5.0.138", - "matchCriteriaId": "A37BDAC5-7735-4A63-8372-033B5D0C007C" + "matchCriteriaId": "DA9F0AF7-9C96-4523-B30F-78C2BEEE933C" } ] } diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json index c1f8091b38c..81d26f87f01 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31419", "sourceIdentifier": "bressers@elastic.co", "published": "2023-10-26T18:15:08.647", - "lastModified": "2023-11-16T16:15:30.490", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:16:30.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -116,7 +116,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231116-0010/", - "source": "bressers@elastic.co" + "source": "bressers@elastic.co", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.elastic.co/community/security", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json index 30ba437318c..b5261db7a3b 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34058", "sourceIdentifier": "security@vmware.com", "published": "2023-10-27T05:15:38.957", - "lastModified": "2023-11-17T05:15:12.043", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:29:46.450", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -141,6 +141,31 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -156,20 +181,33 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html", "source": "security@vmware.com", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5543", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json index 37150daa160..d3ec4b20a28 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3431", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-27T15:15:11.743", - "lastModified": "2023-10-01T06:15:09.960", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:21:58.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -94,6 +94,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -115,7 +130,11 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json index 8adf0c3cb1a..2c7ca623e38 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3432", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-27T15:15:11.980", - "lastModified": "2023-10-01T06:15:10.207", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:23:00.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -84,6 +84,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -105,7 +120,11 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FV7XL3CY3K3K5ER3ASMEQA546MIQQ7QM/", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38039.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38039.json index 124aea75141..0268e22e381 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38039.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38039.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38039", "sourceIdentifier": "support@hackerone.com", "published": "2023-09-15T04:15:10.127", - "lastModified": "2024-01-26T17:15:09.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:00:05.280", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -74,10 +74,20 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" } ] } @@ -87,19 +97,31 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/17", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/34", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/37", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/38", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://hackerone.com/reports/2072338", @@ -113,11 +135,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/", @@ -128,31 +156,52 @@ }, { "url": "https://security.gentoo.org/glsa/202310-12", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20231013-0005/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214036", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214057", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214058", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214063", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.insyde.com/security-pledge/SA-2023064", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json index 6e53cf095d3..45147fbad43 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38524.json @@ -2,12 +2,16 @@ "id": "CVE-2023-38524", "sourceIdentifier": "productcert@siemens.com", "published": "2023-08-08T10:15:15.627", - "lastModified": "2023-11-14T11:15:10.070", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:23:20.833", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected applications contain null pointer dereference while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Parasolid V34.1 (Todas las versiones inferiores a V34.1.258), Parasolid V35.0 (Todas las versiones inferiores a V35.0.254), Parasolid V35.1 (Todas las versiones inferiores a V35.1. 171), Teamcenter Visualization V14.1 (Todas las versiones inferiores a V14.1.0.11), Teamcenter Visualization V14.2 (Todas las versiones inferiores a V14.2.0.6), Teamcenter Visualization V14.3 (Todas las versiones inferiores a V14.3.0.3). Las aplicaciones afectadas contienen desviaci\u00f3n de puntero nulo al analizar archivos X_T especialmente dise\u00f1ados. Esto podr\u00eda permitir a un atacante ejecutar c\u00f3digo en el contexto del proceso actual." } ], "metrics": { @@ -104,6 +108,13 @@ "versionEndExcluding": "35.1.171", "matchCriteriaId": "EA7FF725-2396-492A-8B97-CA77B4EFCC48" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.1", + "versionEndExcluding": "14.1.0.11", + "matchCriteriaId": "9EF3388B-D057-4DB9-96AE-B6F4678FE5B8" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", @@ -113,13 +124,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F859B7F9-2AD8-4B2E-9E26-7DEE54160348" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:14.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8048B948-FD64-44FA-B5C3-52966997A1A4" + "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.3", + "versionEndExcluding": "14.3.0.3", + "matchCriteriaId": "99F0D457-7D65-40DC-BCFA-339FA5648709" } ] } diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39854.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39854.json index 618e2c8414a..0eac09ffcac 100644 --- a/CVE-2023/CVE-2023-398xx/CVE-2023-39854.json +++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39854.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39854", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-09T07:15:24.570", - "lastModified": "2023-10-13T19:01:50.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:10:05.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43616.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43616.json index 51a05478083..4ef002f6a86 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43616.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43616.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43616", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-20T06:15:10.523", - "lastModified": "2023-09-22T00:15:13.173", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:05:32.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/schollz/croc/issues/594", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44109.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44109.json index 05ee4953922..5751054ba0e 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44109.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44109", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T11:15:14.120", - "lastModified": "2023-10-16T16:43:26.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:09:11.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46595.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46595.json index c12c23e8f0b..a6be54e87f5 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46595.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46595", "sourceIdentifier": "security.vulnerabilities@algosec.com", "published": "2023-11-02T08:15:08.040", - "lastModified": "2023-11-28T10:15:07.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T02:18:54.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 }, { @@ -96,6 +96,11 @@ "vulnerable": true, "criteria": "cpe:2.3:a:algosec:fireflow:a32.50:*:*:*:*:*:*:*", "matchCriteriaId": "E3144E50-DB4B-4342-8147-7604003EC8D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:algosec:fireflow:a32.60:*:*:*:*:*:*:*", + "matchCriteriaId": "8DF7FEFC-C3D7-490D-BE7C-1FE5EBB3B7F2" } ] } @@ -105,7 +110,10 @@ "references": [ { "url": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46595.htm", - "source": "security.vulnerabilities@algosec.com" + "source": "security.vulnerabilities@algosec.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json index 8857191d246..cabddd13909 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46747", "sourceIdentifier": "f5sirt@f5.com", "published": "2023-10-26T21:15:08.097", - "lastModified": "2023-11-16T02:15:26.577", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:15:55.817", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2023-10-31", "cisaActionDue": "2023-11-21", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -21,7 +21,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "f5sirt@f5.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -39,13 +39,43 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { - "source": "f5sirt@f5.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, + { + "source": "f5sirt@f5.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -959,7 +989,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://my.f5.com/manage/s/article/K000137353", @@ -970,7 +1004,11 @@ }, { "url": "https://www.secpod.com/blog/f5-issues-warning-big-ip-vulnerability-used-in-active-exploit-chain/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json index 6b28b6bc931..9097ef0d54f 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46748", "sourceIdentifier": "f5sirt@f5.com", "published": "2023-10-26T21:15:08.177", - "lastModified": "2023-11-16T02:15:26.963", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T02:14:46.903", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2023-10-31", "cisaActionDue": "2023-11-21", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -21,7 +21,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "f5sirt@f5.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -39,6 +39,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -976,7 +996,11 @@ }, { "url": "https://www.secpod.com/blog/f5-issues-warning-big-ip-vulnerability-used-in-active-exploit-chain/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5048.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5048.json index 870198a5db1..e50a5efe9e6 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5048.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5048", "sourceIdentifier": "security@wordfence.com", "published": "2023-11-22T16:15:10.137", - "lastModified": "2023-11-27T22:10:05.503", + "lastModified": "2024-02-01T02:26:27.517", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:web-dorado:contact_form_builder:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:web-dorado:wp_form_builder:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.0.72", - "matchCriteriaId": "12883FC1-3E80-4059-8412-263E9E5E81F7" + "matchCriteriaId": "CEBAD1BE-7C5A-4B6A-B1EB-2EA42225BC75" } ] } @@ -93,7 +93,7 @@ "url": "https://plugins.trac.wordpress.org/browser/contact-form-builder/tags/1.0.72/frontend/views/CFMViewForm_maker.php#L102", "source": "security@wordfence.com", "tags": [ - "Product" + "Issue Tracking" ] }, { diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5084.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5084.json index 6b95f4f259d..93561a5036c 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5084.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5084.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5084", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-20T10:15:15.723", - "lastModified": "2023-10-10T08:15:11.257", - "vulnStatus": "Modified", + "lastModified": "2024-02-01T01:06:21.223", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,7 +11,7 @@ }, { "lang": "es", - "value": "Cross-Site Scripting (XSS): reflejadas en el repositorio de GitHub hestiacp/hestiacp antes de 1.8.8." + "value": "Cross-Site Scripting (XSS): Reflejadas en el repositorio de GitHub hestiacp/hestiacp antes de 1.8.8." } ], "metrics": { @@ -91,7 +91,10 @@ "references": [ { "url": "https://github.com/hestiacp/hestiacp/pull/4013/commits/5131f5a966759df77477fdf7f29daa2bda93b1ff", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/f3340570-6e59-4c72-a7d1-d4b829b4fb45", diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5467.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5467.json index 0cb5d36a993..d67f2aa2d08 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5467.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5467.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5467", "sourceIdentifier": "security@wordfence.com", "published": "2023-10-10T05:15:09.407", - "lastModified": "2023-11-07T04:24:03.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-01T01:17:21.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -37,7 +37,7 @@ "impactScore": 2.7 }, { - "source": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", + "source": "security@wordfence.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -58,6 +58,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -81,14 +93,14 @@ "url": "https://plugins.trac.wordpress.org/browser/geo-my-wp/tags/4.0.1/plugins/single-location/includes/class-gmw-single-location.php#L413", "source": "security@wordfence.com", "tags": [ - "Patch" + "Issue Tracking" ] }, { "url": "https://plugins.trac.wordpress.org/browser/geo-my-wp/tags/4.0/plugins/single-location/includes/class-gmw-single-location.php#L401", "source": "security@wordfence.com", "tags": [ - "Product" + "Issue Tracking" ] }, { diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json new file mode 100644 index 00000000000..6488b75ca9b --- /dev/null +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0831.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-0831", + "sourceIdentifier": "security@hashicorp.com", + "published": "2024-02-01T02:15:46.330", + "lastModified": "2024-02-01T02:15:46.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vault and Vault Enterprise (\u201cVault\u201d) may expose sensitive information when enabling an audit device which specifies the `log_raw` option, which may log sensitive information to other audit devices, regardless of whether they are configured to use `log_raw`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration", + "source": "security@hashicorp.com" + }, + { + "url": "https://link-to-discuss", + "source": "security@hashicorp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json index 90b9ebb4a68..29cd74afa95 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21893.json @@ -2,8 +2,12 @@ "id": "CVE-2024-21893", "sourceIdentifier": "support@hackerone.com", "published": "2024-01-31T18:15:47.437", - "lastModified": "2024-01-31T19:54:04.487", + "lastModified": "2024-02-01T02:00:01.187", "vulnStatus": "Analyzed", + "cisaExploitAdd": "2024-01-31", + "cisaActionDue": "2024-02-02", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 25feca52d10..160954a2e8c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-01T00:55:25.270538+00:00 +2024-02-01T03:00:27.227157+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-01T00:54:17.627000+00:00 +2024-02-01T02:32:09.317000+00:00 ``` ### Last Data Feed Release @@ -23,44 +23,51 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-01-31T01:00:28.300889+00:00 +2024-02-01T01:00:28.264705+00:00 ``` ### Total Number of included CVEs ```plain -237256 +237257 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `1` -* [CVE-2024-24571](CVE-2024/CVE-2024-245xx/CVE-2024-24571.json) (`2024-01-31T23:15:08.110`) -* [CVE-2024-24572](CVE-2024/CVE-2024-245xx/CVE-2024-24572.json) (`2024-01-31T23:15:08.337`) -* [CVE-2024-24573](CVE-2024/CVE-2024-245xx/CVE-2024-24573.json) (`2024-01-31T23:15:08.560`) +* [CVE-2024-0831](CVE-2024/CVE-2024-08xx/CVE-2024-0831.json) (`2024-02-01T02:15:46.330`) ### CVEs modified in the last Commit -Recently modified CVEs: `16` +Recently modified CVEs: `42` -* [CVE-2020-12659](CVE-2020/CVE-2020-126xx/CVE-2020-12659.json) (`2024-02-01T00:50:37.413`) -* [CVE-2023-52251](CVE-2023/CVE-2023-522xx/CVE-2023-52251.json) (`2024-01-31T23:25:48.163`) -* [CVE-2023-51833](CVE-2023/CVE-2023-518xx/CVE-2023-51833.json) (`2024-01-31T23:32:20.930`) -* [CVE-2023-45779](CVE-2023/CVE-2023-457xx/CVE-2023-45779.json) (`2024-02-01T00:15:54.673`) -* [CVE-2023-5391](CVE-2023/CVE-2023-53xx/CVE-2023-5391.json) (`2024-02-01T00:49:46.897`) -* [CVE-2023-44389](CVE-2023/CVE-2023-443xx/CVE-2023-44389.json) (`2024-02-01T00:50:52.917`) -* [CVE-2023-4236](CVE-2023/CVE-2023-42xx/CVE-2023-4236.json) (`2024-02-01T00:53:41.997`) -* [CVE-2023-3550](CVE-2023/CVE-2023-35xx/CVE-2023-3550.json) (`2024-02-01T00:54:17.627`) -* [CVE-2024-23817](CVE-2024/CVE-2024-238xx/CVE-2024-23817.json) (`2024-01-31T23:25:58.247`) -* [CVE-2024-23656](CVE-2024/CVE-2024-236xx/CVE-2024-23656.json) (`2024-01-31T23:26:14.650`) -* [CVE-2024-23655](CVE-2024/CVE-2024-236xx/CVE-2024-23655.json) (`2024-01-31T23:26:33.637`) -* [CVE-2024-21630](CVE-2024/CVE-2024-216xx/CVE-2024-21630.json) (`2024-01-31T23:45:38.600`) -* [CVE-2024-0886](CVE-2024/CVE-2024-08xx/CVE-2024-0886.json) (`2024-01-31T23:45:54.590`) -* [CVE-2024-0887](CVE-2024/CVE-2024-08xx/CVE-2024-0887.json) (`2024-01-31T23:46:03.647`) -* [CVE-2024-21619](CVE-2024/CVE-2024-216xx/CVE-2024-21619.json) (`2024-01-31T23:46:19.863`) -* [CVE-2024-23615](CVE-2024/CVE-2024-236xx/CVE-2024-23615.json) (`2024-01-31T23:46:44.913`) +* [CVE-2023-5084](CVE-2023/CVE-2023-50xx/CVE-2023-5084.json) (`2024-02-01T01:06:21.223`) +* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2024-02-01T01:09:11.587`) +* [CVE-2023-39854](CVE-2023/CVE-2023-398xx/CVE-2023-39854.json) (`2024-02-01T01:10:05.043`) +* [CVE-2023-5467](CVE-2023/CVE-2023-54xx/CVE-2023-5467.json) (`2024-02-01T01:17:21.890`) +* [CVE-2023-3431](CVE-2023/CVE-2023-34xx/CVE-2023-3431.json) (`2024-02-01T01:21:58.477`) +* [CVE-2023-3432](CVE-2023/CVE-2023-34xx/CVE-2023-3432.json) (`2024-02-01T01:23:00.190`) +* [CVE-2023-2898](CVE-2023/CVE-2023-28xx/CVE-2023-2898.json) (`2024-02-01T01:27:24.977`) +* [CVE-2023-2269](CVE-2023/CVE-2023-22xx/CVE-2023-2269.json) (`2024-02-01T01:33:49.730`) +* [CVE-2023-2124](CVE-2023/CVE-2023-21xx/CVE-2023-2124.json) (`2024-02-01T01:35:35.037`) +* [CVE-2023-2007](CVE-2023/CVE-2023-20xx/CVE-2023-2007.json) (`2024-02-01T01:39:22.507`) +* [CVE-2023-1503](CVE-2023/CVE-2023-15xx/CVE-2023-1503.json) (`2024-02-01T01:44:58.693`) +* [CVE-2023-1504](CVE-2023/CVE-2023-15xx/CVE-2023-1504.json) (`2024-02-01T02:00:08.550`) +* [CVE-2023-22067](CVE-2023/CVE-2023-220xx/CVE-2023-22067.json) (`2024-02-01T02:09:52.477`) +* [CVE-2023-22025](CVE-2023/CVE-2023-220xx/CVE-2023-22025.json) (`2024-02-01T02:11:33.680`) +* [CVE-2023-22074](CVE-2023/CVE-2023-220xx/CVE-2023-22074.json) (`2024-02-01T02:13:06.323`) +* [CVE-2023-46748](CVE-2023/CVE-2023-467xx/CVE-2023-46748.json) (`2024-02-01T02:14:46.903`) +* [CVE-2023-46747](CVE-2023/CVE-2023-467xx/CVE-2023-46747.json) (`2024-02-01T02:15:55.817`) +* [CVE-2023-31419](CVE-2023/CVE-2023-314xx/CVE-2023-31419.json) (`2024-02-01T02:16:30.827`) +* [CVE-2023-46595](CVE-2023/CVE-2023-465xx/CVE-2023-46595.json) (`2024-02-01T02:18:54.220`) +* [CVE-2023-38524](CVE-2023/CVE-2023-385xx/CVE-2023-38524.json) (`2024-02-01T02:23:20.833`) +* [CVE-2023-5048](CVE-2023/CVE-2023-50xx/CVE-2023-5048.json) (`2024-02-01T02:26:27.517`) +* [CVE-2023-34058](CVE-2023/CVE-2023-340xx/CVE-2023-34058.json) (`2024-02-01T02:29:46.450`) +* [CVE-2023-31100](CVE-2023/CVE-2023-311xx/CVE-2023-31100.json) (`2024-02-01T02:30:22.687`) +* [CVE-2023-27500](CVE-2023/CVE-2023-275xx/CVE-2023-27500.json) (`2024-02-01T02:32:09.317`) +* [CVE-2024-21893](CVE-2024/CVE-2024-218xx/CVE-2024-21893.json) (`2024-02-01T02:00:01.187`) ## Download and Usage