diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0031.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0031.json index 93decae021d..89c06080983 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0031.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0031.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0031", "sourceIdentifier": "cve@mitre.org", "published": "1997-07-08T04:00:00.000", - "lastModified": "2021-07-22T13:53:45.333", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -89,7 +89,10 @@ "references": [ { "url": "http://www.codetalker.com/advisories/vendor/hp/hpsbux9707-065.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-1999/CVE-1999-08xx/CVE-1999-0854.json b/CVE-1999/CVE-1999-08xx/CVE-1999-0854.json index 1c96fbde8e6..53e8ea77182 100644 --- a/CVE-1999/CVE-1999-08xx/CVE-1999-0854.json +++ b/CVE-1999/CVE-1999-08xx/CVE-1999-0854.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0854", "sourceIdentifier": "cve@mitre.org", "published": "1999-11-01T05:00:00.000", - "lastModified": "2023-11-07T01:55:03.427", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.ultimatebb.com/home/versions.shtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1136.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1136.json index fb08c7ff43b..c458868ed62 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1136.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1136.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1136", "sourceIdentifier": "cve@mitre.org", "published": "1998-07-30T04:00:00.000", - "lastModified": "2017-10-10T01:29:02.687", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -111,7 +111,10 @@ }, { "url": "http://www.codetalker.com/advisories/vendor/hp/hpsbux9807-081.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1413", diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1139.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1139.json index 9cf6728a3e3..75846e39bf8 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1139.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1139.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1139", "sourceIdentifier": "cve@mitre.org", "published": "1997-09-01T04:00:00.000", - "lastModified": "2016-10-18T02:01:38.587", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -89,7 +89,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1144.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1144.json index 257f693a354..978b5429ec6 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1144.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1144.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1144", "sourceIdentifier": "cve@mitre.org", "published": "1997-01-30T05:00:00.000", - "lastModified": "2017-10-10T01:29:02.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -87,7 +87,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1161.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1161.json index a8ee99e2a2b..91b392d4206 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1161.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1161.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1161", "sourceIdentifier": "cve@mitre.org", "published": "1996-11-03T05:00:00.000", - "lastModified": "2016-10-18T02:01:49.807", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -94,7 +94,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-1999/CVE-1999-12xx/CVE-1999-1227.json b/CVE-1999/CVE-1999-12xx/CVE-1999-1227.json index da79977774d..698b956e33d 100644 --- a/CVE-1999/CVE-1999-12xx/CVE-1999-1227.json +++ b/CVE-1999/CVE-1999-12xx/CVE-1999-1227.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1227", "sourceIdentifier": "cve@mitre.org", "published": "1999-07-30T04:00:00.000", - "lastModified": "2017-12-19T02:29:04.160", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,14 +71,16 @@ "url": "http://www.ethereal.com/lists/ethereal-dev/199907/msg00126.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.ethereal.com/lists/ethereal-dev/199907/msg00130.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-1999/CVE-1999-12xx/CVE-1999-1249.json b/CVE-1999/CVE-1999-12xx/CVE-1999-1249.json index cc862553fcb..dd07919d0d6 100644 --- a/CVE-1999/CVE-1999-12xx/CVE-1999-1249.json +++ b/CVE-1999/CVE-1999-12xx/CVE-1999-1249.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1249", "sourceIdentifier": "cve@mitre.org", "published": "1997-01-06T05:00:00.000", - "lastModified": "2017-10-10T01:29:04.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,9 +72,14 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/8099", + "source": "cve@mitre.org" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2057", "source": "cve@mitre.org" diff --git a/CVE-1999/CVE-1999-12xx/CVE-1999-1284.json b/CVE-1999/CVE-1999-12xx/CVE-1999-1284.json index 60124bcbda8..ad2f6c5e0c4 100644 --- a/CVE-1999/CVE-1999-12xx/CVE-1999-1284.json +++ b/CVE-1999/CVE-1999-12xx/CVE-1999-1284.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1284", "sourceIdentifier": "cve@mitre.org", "published": "1998-11-05T05:00:00.000", - "lastModified": "2017-10-10T01:29:05.153", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.dynamsol.com/puppet/text/new.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/11131", diff --git a/CVE-2000/CVE-2000-01xx/CVE-2000-0141.json b/CVE-2000/CVE-2000-01xx/CVE-2000-0141.json index 9a5db1fbd33..f58ffe460a3 100644 --- a/CVE-2000/CVE-2000-01xx/CVE-2000-0141.json +++ b/CVE-2000/CVE-2000-01xx/CVE-2000-0141.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0141", "sourceIdentifier": "cve@mitre.org", "published": "2000-02-11T05:00:00.000", - "lastModified": "2023-11-07T01:55:13.203", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,7 +81,10 @@ }, { "url": "http://www.ultimatebb.com/home/versions.shtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-02xx/CVE-2000-0240.json b/CVE-2000/CVE-2000-02xx/CVE-2000-0240.json index 022c7b4c2ec..f3b42754097 100644 --- a/CVE-2000/CVE-2000-02xx/CVE-2000-0240.json +++ b/CVE-2000/CVE-2000-02xx/CVE-2000-0240.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0240", "sourceIdentifier": "cve@mitre.org", "published": "2000-03-21T05:00:00.000", - "lastModified": "2023-11-07T01:55:15.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,10 @@ }, { "url": "http://www.vqsoft.com/vq/server/faqs/dotdotbug.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-02xx/CVE-2000-0274.json b/CVE-2000/CVE-2000-02xx/CVE-2000-0274.json index 0e44f058cf8..5190ee00f49 100644 --- a/CVE-2000/CVE-2000-02xx/CVE-2000-0274.json +++ b/CVE-2000/CVE-2000-02xx/CVE-2000-0274.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0274", "sourceIdentifier": "cve@mitre.org", "published": "2000-04-10T04:00:00.000", - "lastModified": "2008-09-10T19:03:48.477", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.braysystems.com/linux/trustees.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/1096", diff --git a/CVE-2000/CVE-2000-03xx/CVE-2000-0381.json b/CVE-2000/CVE-2000-03xx/CVE-2000-0381.json index 962eb2fde06..5ac31354392 100644 --- a/CVE-2000/CVE-2000-03xx/CVE-2000-0381.json +++ b/CVE-2000/CVE-2000-03xx/CVE-2000-0381.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0381", "sourceIdentifier": "cve@mitre.org", "published": "2000-05-05T04:00:00.000", - "lastModified": "2008-09-10T19:04:18.647", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.perfectotech.com/blackwatchlabs/vul5_05.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/1178", diff --git a/CVE-2000/CVE-2000-04xx/CVE-2000-0411.json b/CVE-2000/CVE-2000-04xx/CVE-2000-0411.json index 349eed53eaa..6bf67b1987c 100644 --- a/CVE-2000/CVE-2000-04xx/CVE-2000-0411.json +++ b/CVE-2000/CVE-2000-04xx/CVE-2000-0411.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0411", "sourceIdentifier": "cve@mitre.org", "published": "2000-05-10T04:00:00.000", - "lastModified": "2008-09-10T19:04:36.353", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.perfectotech.com/blackwatchlabs/vul5_10.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/1187", diff --git a/CVE-2000/CVE-2000-05xx/CVE-2000-0583.json b/CVE-2000/CVE-2000-05xx/CVE-2000-0583.json index 9200d4f96b6..f441efaeee4 100644 --- a/CVE-2000/CVE-2000-05xx/CVE-2000-0583.json +++ b/CVE-2000/CVE-2000-05xx/CVE-2000-0583.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0583", "sourceIdentifier": "cve@mitre.org", "published": "2000-06-30T04:00:00.000", - "lastModified": "2023-11-07T01:55:20.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,10 @@ }, { "url": "http://www.vpopmail.cx/vpopmail-ChangeLog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-07xx/CVE-2000-0707.json b/CVE-2000/CVE-2000-07xx/CVE-2000-0707.json index c62ff54cf0e..d57ead19946 100644 --- a/CVE-2000/CVE-2000-07xx/CVE-2000-0707.json +++ b/CVE-2000/CVE-2000-07xx/CVE-2000-0707.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0707", "sourceIdentifier": "cve@mitre.org", "published": "2000-10-20T04:00:00.000", - "lastModified": "2008-09-05T20:21:41.483", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,7 +82,10 @@ }, { "url": "http://pccs-linux.com/public/view.php3?bn=agora_pccslinux&key=965951324", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/1557", diff --git a/CVE-2000/CVE-2000-11xx/CVE-2000-1117.json b/CVE-2000/CVE-2000-11xx/CVE-2000-1117.json index 4d05e4e7b99..4f10651f45c 100644 --- a/CVE-2000/CVE-2000-11xx/CVE-2000-1117.json +++ b/CVE-2000/CVE-2000-11xx/CVE-2000-1117.json @@ -2,7 +2,7 @@ "id": "CVE-2000-1117", "sourceIdentifier": "cve@mitre.org", "published": "2001-01-09T05:00:00.000", - "lastModified": "2008-09-10T19:06:39.507", + "lastModified": "2024-02-14T15:16:30.273", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -69,13 +69,19 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2000-11/0341.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/1994", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2001/CVE-2001-04xx/CVE-2001-0479.json b/CVE-2001/CVE-2001-04xx/CVE-2001-0479.json index 8a438a34bdf..6537e98c627 100644 --- a/CVE-2001/CVE-2001-04xx/CVE-2001-0479.json +++ b/CVE-2001/CVE-2001-04xx/CVE-2001-0479.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0479", "sourceIdentifier": "cve@mitre.org", "published": "2001-06-27T04:00:00.000", - "lastModified": "2008-09-05T20:24:12.913", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,7 +82,10 @@ }, { "url": "http://www.greatbridge.org/project/phppgadmin/cvs/checkout.php/phpPgAdmin/ChangeLog?r=1.13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/2640", diff --git a/CVE-2001/CVE-2001-08xx/CVE-2001-0805.json b/CVE-2001/CVE-2001-08xx/CVE-2001-0805.json index f2a934b2feb..4f182e0fe9e 100644 --- a/CVE-2001/CVE-2001-08xx/CVE-2001-0805.json +++ b/CVE-2001/CVE-2001-08xx/CVE-2001-0805.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0805", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-06T05:00:00.000", - "lastModified": "2023-11-07T01:55:37.850", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,7 +74,10 @@ "references": [ { "url": "http://www.securityfocus.com/archive/1/20010619150935.A5226%40tarantella.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/3B2E37D0.81D9ED9D%40snosoft.com", diff --git a/CVE-2001/CVE-2001-09xx/CVE-2001-0947.json b/CVE-2001/CVE-2001-09xx/CVE-2001-0947.json index c956e6fbd79..3dfb212d9af 100644 --- a/CVE-2001/CVE-2001-09xx/CVE-2001-0947.json +++ b/CVE-2001/CVE-2001-09xx/CVE-2001-0947.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0947", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-04T05:00:00.000", - "lastModified": "2017-12-19T02:29:28.877", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -133,7 +133,8 @@ "url": "http://www.valicert.com/support/security_advisory_eva.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2001/CVE-2001-09xx/CVE-2001-0948.json b/CVE-2001/CVE-2001-09xx/CVE-2001-0948.json index cd7616e8f82..22e2ed8dd63 100644 --- a/CVE-2001/CVE-2001-09xx/CVE-2001-0948.json +++ b/CVE-2001/CVE-2001-09xx/CVE-2001-0948.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0948", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-04T05:00:00.000", - "lastModified": "2017-12-19T02:29:28.940", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -133,7 +133,8 @@ "url": "http://www.valicert.com/support/security_advisory_eva.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2001/CVE-2001-09xx/CVE-2001-0949.json b/CVE-2001/CVE-2001-09xx/CVE-2001-0949.json index d2f5f4efeef..3ccf3b98fc2 100644 --- a/CVE-2001/CVE-2001-09xx/CVE-2001-0949.json +++ b/CVE-2001/CVE-2001-09xx/CVE-2001-0949.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0949", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-04T05:00:00.000", - "lastModified": "2017-12-19T02:29:29.020", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -185,7 +185,8 @@ "url": "http://www.valicert.com/support/security_advisory_eva.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2001/CVE-2001-09xx/CVE-2001-0950.json b/CVE-2001/CVE-2001-09xx/CVE-2001-0950.json index 0e39903309c..2d1a9a280ab 100644 --- a/CVE-2001/CVE-2001-09xx/CVE-2001-0950.json +++ b/CVE-2001/CVE-2001-09xx/CVE-2001-0950.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0950", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-04T05:00:00.000", - "lastModified": "2017-12-19T02:29:29.080", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T01:17:43.863", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -139,7 +139,10 @@ }, { "url": "http://www.valicert.com/support/security_advisory_eva.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7651", diff --git a/CVE-2001/CVE-2001-09xx/CVE-2001-0967.json b/CVE-2001/CVE-2001-09xx/CVE-2001-0967.json index e259be03006..fb4788ce97a 100644 --- a/CVE-2001/CVE-2001-09xx/CVE-2001-0967.json +++ b/CVE-2001/CVE-2001-09xx/CVE-2001-0967.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0967", "sourceIdentifier": "cve@mitre.org", "published": "2001-08-31T04:00:00.000", - "lastModified": "2008-09-05T20:25:21.317", + "lastModified": "2024-02-14T16:55:30.850", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-916" } ] } @@ -58,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:knox_software:arkeia:4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D77845A3-D9BF-4C82-9F8A-F6799FBACFB0" + "criteria": "cpe:2.3:a:arkeia:arkeia:4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "05556BA5-3EE3-4734-A78A-5548FD536018" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:knox_software:arkeia:4.2.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D8891574-D1EF-48A6-943D-919077737F3E" + "criteria": "cpe:2.3:a:arkeia:arkeia:4.2.8-2:*:*:*:*:*:*:*", + "matchCriteriaId": "78F95D22-F8C1-42F9-8D03-B024C347BAD0" } ] } @@ -74,13 +96,19 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/3204", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2001/CVE-2001-11xx/CVE-2001-1109.json b/CVE-2001/CVE-2001-11xx/CVE-2001-1109.json index 2320852aba6..a4b1bed1064 100644 --- a/CVE-2001/CVE-2001-11xx/CVE-2001-1109.json +++ b/CVE-2001/CVE-2001-11xx/CVE-2001-1109.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1109", "sourceIdentifier": "cve@mitre.org", "published": "2001-09-12T04:00:00.000", - "lastModified": "2017-12-19T02:29:33.457", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,10 @@ "references": [ { "url": "http://www.eftp.org/releasehistory.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/213647", diff --git a/CVE-2001/CVE-2001-11xx/CVE-2001-1172.json b/CVE-2001/CVE-2001-11xx/CVE-2001-1172.json index c72a325862f..6aef5a71c00 100644 --- a/CVE-2001/CVE-2001-11xx/CVE-2001-1172.json +++ b/CVE-2001/CVE-2001-11xx/CVE-2001-1172.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1172", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-19T04:00:00.000", - "lastModified": "2017-10-10T01:30:01.437", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,6 +77,13 @@ }, { "url": "http://www.omnisecure.com/security-alert.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/5452", "source": "cve@mitre.org" }, { diff --git a/CVE-2001/CVE-2001-11xx/CVE-2001-1193.json b/CVE-2001/CVE-2001-11xx/CVE-2001-1193.json index ae48e9d2b28..dc005241e96 100644 --- a/CVE-2001/CVE-2001-11xx/CVE-2001-1193.json +++ b/CVE-2001/CVE-2001-11xx/CVE-2001-1193.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1193", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-13T05:00:00.000", - "lastModified": "2017-10-10T01:30:01.860", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ "references": [ { "url": "http://www.eftp.org/releasehistory.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.kb.cert.org/vuls/id/413875", @@ -82,6 +85,10 @@ "US Government Resource" ] }, + { + "url": "http://www.osvdb.org/2003", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/245393", "source": "cve@mitre.org", diff --git a/CVE-2001/CVE-2001-11xx/CVE-2001-1199.json b/CVE-2001/CVE-2001-11xx/CVE-2001-1199.json index e7b3be75025..3bb44d37b89 100644 --- a/CVE-2001/CVE-2001-11xx/CVE-2001-1199.json +++ b/CVE-2001/CVE-2001-11xx/CVE-2001-1199.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1199", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-17T05:00:00.000", - "lastModified": "2008-09-05T20:25:56.233", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -228,7 +228,10 @@ "references": [ { "url": "http://www.agoracgi.com/security.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.iss.net/security_center/static/7708.php", @@ -237,6 +240,10 @@ "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/698", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/246044", "source": "cve@mitre.org", diff --git a/CVE-2001/CVE-2001-12xx/CVE-2001-1246.json b/CVE-2001/CVE-2001-12xx/CVE-2001-1246.json index fc82d84d7ea..415eab32d49 100644 --- a/CVE-2001/CVE-2001-12xx/CVE-2001-1246.json +++ b/CVE-2001/CVE-2001-12xx/CVE-2001-1246.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1246", "sourceIdentifier": "cve@mitre.org", "published": "2001-06-30T04:00:00.000", - "lastModified": "2008-09-10T19:10:02.023", + "lastModified": "2024-02-14T15:17:03.503", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-88" } ] } @@ -58,8 +58,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D" + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.5", + "versionEndIncluding": "4.1.0", + "matchCriteriaId": "AF5EFBC9-2F17-44CD-8298-3D0BA0B48F4C" } ] } @@ -69,35 +71,58 @@ "references": [ { "url": "http://online.securityfocus.com/archive/1/194425", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.iss.net/security_center/static/6787.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-102.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-129.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-159.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/2954", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-13xx/CVE-2001-1367.json b/CVE-2001/CVE-2001-13xx/CVE-2001-1367.json index 837f83a2845..18e2b74d5cc 100644 --- a/CVE-2001/CVE-2001-13xx/CVE-2001-1367.json +++ b/CVE-2001/CVE-2001-13xx/CVE-2001-1367.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1367", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-19T04:00:00.000", - "lastModified": "2017-10-10T01:30:02.577", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "http://phpslice.org/comments.php?aid=1031&", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9649", diff --git a/CVE-2001/CVE-2001-13xx/CVE-2001-1387.json b/CVE-2001/CVE-2001-13xx/CVE-2001-1387.json index 2f83054f3a8..3a1b65ee29b 100644 --- a/CVE-2001/CVE-2001-13xx/CVE-2001-1387.json +++ b/CVE-2001/CVE-2001-13xx/CVE-2001-1387.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1387", "sourceIdentifier": "cve@mitre.org", "published": "2001-11-05T05:00:00.000", - "lastModified": "2021-02-02T17:13:52.523", + "lastModified": "2024-02-14T15:17:09.183", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-203" } ] } diff --git a/CVE-2001/CVE-2001-14xx/CVE-2001-1483.json b/CVE-2001/CVE-2001-14xx/CVE-2001-1483.json index 8411a57fbe1..7d4e5bfca19 100644 --- a/CVE-2001/CVE-2001-14xx/CVE-2001-1483.json +++ b/CVE-2001/CVE-2001-14xx/CVE-2001-1483.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1483", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-31T05:00:00.000", - "lastModified": "2023-11-07T01:55:44.457", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:17:21.773", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -58,13 +58,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:nrl:opie:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E2B076A0-0216-4A52-ABA6-2E511FB6DB5E" + "criteria": "cpe:2.3:a:nrl.navy:one-time_passwords_in_everything:2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "30EBC335-4A60-4049-ACE6-43A5EF24ADB8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:nrl:opie:2.32:*:*:*:*:*:*:*", - "matchCriteriaId": "F9A53F58-7514-4B07-AC56-C6F928F9D3F3" + "criteria": "cpe:2.3:a:nrl.navy:one-time_passwords_in_everything:2.32:*:*:*:*:*:*:*", + "matchCriteriaId": "B142FD11-18C8-4BF3-AC54-8F9563BDA558" } ] } @@ -74,15 +74,29 @@ "references": [ { "url": "http://www.securityfocus.com/archive/1/20011115221226.7C93E186B0%40atlas.dgp.toronto.edu", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3549", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7572", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-15xx/CVE-2001-1528.json b/CVE-2001/CVE-2001-15xx/CVE-2001-1528.json index 0e030e67bf4..c51c190166a 100644 --- a/CVE-2001/CVE-2001-15xx/CVE-2001-1528.json +++ b/CVE-2001/CVE-2001-15xx/CVE-2001-1528.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1528", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:26:47.077", + "lastModified": "2024-02-14T15:17:15.647", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:amtote_international:homebet:*:*:*:*:*:*:*:*", - "matchCriteriaId": "D92CFCA0-9B78-4477-B260-C69152F2FFF7" + "criteria": "cpe:2.3:a:amtote:homebet:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1BE5F47-8EFE-4AD2-9D5D-7FEA3D428C4F" } ] } @@ -71,18 +71,25 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2001-09/0235.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/7185.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/3371", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json b/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json index a252213dce4..0ffb1c3a302 100644 --- a/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json +++ b/CVE-2001/CVE-2001-15xx/CVE-2001-1546.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1546", "sourceIdentifier": "cve@mitre.org", "published": "2001-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:26:49.717", + "lastModified": "2024-02-14T16:55:45.970", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -69,13 +91,28 @@ "references": [ { "url": "http://www.iss.net/security_center/static/7682.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/244367", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3653", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2002/CVE-2002-02xx/CVE-2002-0203.json b/CVE-2002/CVE-2002-02xx/CVE-2002-0203.json index 9a1a172a706..69309720f6b 100644 --- a/CVE-2002/CVE-2002-02xx/CVE-2002-0203.json +++ b/CVE-2002/CVE-2002-02xx/CVE-2002-0203.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0203", "sourceIdentifier": "cve@mitre.org", "published": "2002-05-16T04:00:00.000", - "lastModified": "2016-10-18T02:17:04.787", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -90,7 +90,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-02xx/CVE-2002-0208.json b/CVE-2002/CVE-2002-02xx/CVE-2002-0208.json index 932600962d2..06b9b0d5103 100644 --- a/CVE-2002/CVE-2002-02xx/CVE-2002-0208.json +++ b/CVE-2002/CVE-2002-02xx/CVE-2002-0208.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0208", "sourceIdentifier": "cve@mitre.org", "published": "2002-05-16T04:00:00.000", - "lastModified": "2008-09-11T00:00:42.883", + "lastModified": "2024-02-14T15:00:26.187", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pgp_security:pgpfire:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D82390EE-8D30-4AF8-B962-5F6874801C8D" + "criteria": "cpe:2.3:a:network.associates:pgpfire:7.1:*:*:*:*:windows:*:*", + "matchCriteriaId": "47C01348-4D8A-4000-AA8E-907FB0A360D0" } ] } @@ -75,6 +75,9 @@ "url": "http://online.securityfocus.com/archive/1/252407", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -82,12 +85,18 @@ "url": "http://www.iss.net/security_center/static/8008.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/3961", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-02xx/CVE-2002-0211.json b/CVE-2002/CVE-2002-02xx/CVE-2002-0211.json index 934fde0d960..983487381e5 100644 --- a/CVE-2002/CVE-2002-02xx/CVE-2002-0211.json +++ b/CVE-2002/CVE-2002-02xx/CVE-2002-0211.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0211", "sourceIdentifier": "cve@mitre.org", "published": "2002-05-16T04:00:00.000", - "lastModified": "2016-10-18T02:17:09.557", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -119,7 +119,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-03xx/CVE-2002-0353.json b/CVE-2002/CVE-2002-03xx/CVE-2002-0353.json index 303ca2d5c44..bf40f3d577e 100644 --- a/CVE-2002/CVE-2002-03xx/CVE-2002-0353.json +++ b/CVE-2002/CVE-2002-03xx/CVE-2002-0353.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0353", "sourceIdentifier": "cve@mitre.org", "published": "2002-06-25T04:00:00.000", - "lastModified": "2008-09-10T19:11:49.897", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,7 +82,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00003.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.iss.net/security_center/static/8952.php", diff --git a/CVE-2002/CVE-2002-04xx/CVE-2002-0401.json b/CVE-2002/CVE-2002-04xx/CVE-2002-0401.json index 0b3c7b8232e..50d4e86c855 100644 --- a/CVE-2002/CVE-2002-04xx/CVE-2002-0401.json +++ b/CVE-2002/CVE-2002-04xx/CVE-2002-0401.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0401", "sourceIdentifier": "cve@mitre.org", "published": "2002-06-18T04:00:00.000", - "lastModified": "2016-10-18T02:20:05.163", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T01:17:43.863", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2002/CVE-2002-04xx/CVE-2002-0402.json b/CVE-2002/CVE-2002-04xx/CVE-2002-0402.json index 0fee024bb03..09385e49aa0 100644 --- a/CVE-2002/CVE-2002-04xx/CVE-2002-0402.json +++ b/CVE-2002/CVE-2002-04xx/CVE-2002-0402.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0402", "sourceIdentifier": "cve@mitre.org", "published": "2002-06-18T04:00:00.000", - "lastModified": "2016-10-18T02:20:06.413", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2002/CVE-2002-04xx/CVE-2002-0403.json b/CVE-2002/CVE-2002-04xx/CVE-2002-0403.json index 1c8088677ab..7415b6d1cbb 100644 --- a/CVE-2002/CVE-2002-04xx/CVE-2002-0403.json +++ b/CVE-2002/CVE-2002-04xx/CVE-2002-0403.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0403", "sourceIdentifier": "cve@mitre.org", "published": "2002-06-18T04:00:00.000", - "lastModified": "2016-10-18T02:20:07.820", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2002/CVE-2002-04xx/CVE-2002-0404.json b/CVE-2002/CVE-2002-04xx/CVE-2002-0404.json index bd3988a2032..eccb9799f3d 100644 --- a/CVE-2002/CVE-2002-04xx/CVE-2002-0404.json +++ b/CVE-2002/CVE-2002-04xx/CVE-2002-0404.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0404", "sourceIdentifier": "cve@mitre.org", "published": "2002-06-18T04:00:00.000", - "lastModified": "2016-10-18T02:20:09.333", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2002/CVE-2002-04xx/CVE-2002-0488.json b/CVE-2002/CVE-2002-04xx/CVE-2002-0488.json index 751314dda32..b5c2694f615 100644 --- a/CVE-2002/CVE-2002-04xx/CVE-2002-0488.json +++ b/CVE-2002/CVE-2002-04xx/CVE-2002-0488.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0488", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:28:09.523", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "http://www.linux-directory.com/scripts/traceroute.pl", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/263285", diff --git a/CVE-2002/CVE-2002-05xx/CVE-2002-0513.json b/CVE-2002/CVE-2002-05xx/CVE-2002-0513.json index 48b009800bf..f848c9b0aaa 100644 --- a/CVE-2002/CVE-2002-05xx/CVE-2002-0513.json +++ b/CVE-2002/CVE-2002-05xx/CVE-2002-0513.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0513", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:28:13.493", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,10 @@ }, { "url": "http://www.symatec-computer.com/forums/viewtopic.php?t=14", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-05xx/CVE-2002-0514.json b/CVE-2002/CVE-2002-05xx/CVE-2002-0514.json index 11d82b548d4..dc8ad74ab12 100644 --- a/CVE-2002/CVE-2002-05xx/CVE-2002-0514.json +++ b/CVE-2002/CVE-2002-05xx/CVE-2002-0514.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0514", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:28:13.633", + "lastModified": "2024-02-14T15:07:31.453", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -75,6 +75,7 @@ "url": "http://www.iss.net/security_center/static/8738.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -82,6 +83,9 @@ "url": "http://www.securityfocus.com/archive/1/265188", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -89,7 +93,10 @@ "url": "http://www.securityfocus.com/bid/4401", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-05xx/CVE-2002-0515.json b/CVE-2002/CVE-2002-05xx/CVE-2002-0515.json index 9955dba2680..58544e44315 100644 --- a/CVE-2002/CVE-2002-05xx/CVE-2002-0515.json +++ b/CVE-2002/CVE-2002-05xx/CVE-2002-0515.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0515", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:28:13.790", + "lastModified": "2024-02-14T15:07:27.150", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -62,8 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "4F24A9D1-B4C8-4216-9AD5-61572A550185" + "criteria": "cpe:2.3:a:phildev:ipfilter:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.25", + "matchCriteriaId": "799CA85E-75CF-4D30-8746-C42293404170" } ] } @@ -75,6 +76,7 @@ "url": "http://www.iss.net/security_center/static/8738.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -82,6 +84,9 @@ "url": "http://www.securityfocus.com/archive/1/265188", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -89,7 +94,10 @@ "url": "http://www.securityfocus.com/bid/4403", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-07xx/CVE-2002-0732.json b/CVE-2002/CVE-2002-07xx/CVE-2002-0732.json index f38f34ffa05..fb2203ea9ec 100644 --- a/CVE-2002/CVE-2002-07xx/CVE-2002-0732.json +++ b/CVE-2002/CVE-2002-07xx/CVE-2002-0732.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0732", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:28:48.477", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -88,7 +88,10 @@ }, { "url": "http://www.levcgi.com/programs.cgi?program=myguestbook&action=history", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/4651", diff --git a/CVE-2002/CVE-2002-08xx/CVE-2002-0821.json b/CVE-2002/CVE-2002-08xx/CVE-2002-0821.json index a1971468231..c20ac8245e5 100644 --- a/CVE-2002/CVE-2002-08xx/CVE-2002-0821.json +++ b/CVE-2002/CVE-2002-08xx/CVE-2002-0821.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0821", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:29:02.303", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -76,7 +76,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00005.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-08xx/CVE-2002-0822.json b/CVE-2002/CVE-2002-08xx/CVE-2002-0822.json index 88d94572732..0a28c46ace5 100644 --- a/CVE-2002/CVE-2002-08xx/CVE-2002-0822.json +++ b/CVE-2002/CVE-2002-08xx/CVE-2002-0822.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0822", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2008-09-05T20:29:02.457", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,7 +72,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00005.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2002/CVE-2002-08xx/CVE-2002-0834.json b/CVE-2002/CVE-2002-08xx/CVE-2002-0834.json index c28ab849012..4fd7b9ccb52 100644 --- a/CVE-2002/CVE-2002-08xx/CVE-2002-0834.json +++ b/CVE-2002/CVE-2002-08xx/CVE-2002-0834.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0834", "sourceIdentifier": "cve@mitre.org", "published": "2002-09-24T04:00:00.000", - "lastModified": "2008-09-10T19:12:59.320", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -111,7 +111,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-09xx/CVE-2002-0998.json b/CVE-2002/CVE-2002-09xx/CVE-2002-0998.json index 7a6068023de..f0000dcc0bf 100644 --- a/CVE-2002/CVE-2002-09xx/CVE-2002-0998.json +++ b/CVE-2002/CVE-2002-09xx/CVE-2002-0998.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0998", "sourceIdentifier": "cve@mitre.org", "published": "2002-10-04T04:00:00.000", - "lastModified": "2008-09-05T20:29:30.410", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -78,7 +78,10 @@ }, { "url": "http://www.care2x.com/modul.php?thispage=headlines&m_titel=NEWS&m_item=Headlines&lang=en", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.iss.net/security_center/static/9552.php", diff --git a/CVE-2002/CVE-2002-09xx/CVE-2002-0999.json b/CVE-2002/CVE-2002-09xx/CVE-2002-0999.json index 83462fc137a..f5bcdbe44d9 100644 --- a/CVE-2002/CVE-2002-09xx/CVE-2002-0999.json +++ b/CVE-2002/CVE-2002-09xx/CVE-2002-0999.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0999", "sourceIdentifier": "cve@mitre.org", "published": "2002-10-04T04:00:00.000", - "lastModified": "2008-09-05T20:29:30.537", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -78,7 +78,10 @@ }, { "url": "http://www.care2x.com/modul.php?thispage=headlines&m_titel=NEWS&m_item=Headlines&lang=en", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.iss.net/security_center/static/9553.php", diff --git a/CVE-2002/CVE-2002-13xx/CVE-2002-1349.json b/CVE-2002/CVE-2002-13xx/CVE-2002-1349.json index 490c2f84ebf..4c4c5ae3d7d 100644 --- a/CVE-2002/CVE-2002-13xx/CVE-2002-1349.json +++ b/CVE-2002/CVE-2002-13xx/CVE-2002-1349.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1349", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-18T05:00:00.000", - "lastModified": "2017-10-10T01:30:11.173", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -112,7 +112,10 @@ }, { "url": "http://www.texonet.com/advisories/TEXONET-20021210.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10814", diff --git a/CVE-2002/CVE-2002-13xx/CVE-2002-1355.json b/CVE-2002/CVE-2002-13xx/CVE-2002-1355.json index f936c0173c8..3b9081429e2 100644 --- a/CVE-2002/CVE-2002-13xx/CVE-2002-1355.json +++ b/CVE-2002/CVE-2002-13xx/CVE-2002-1355.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1355", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-23T05:00:00.000", - "lastModified": "2008-09-05T20:30:22.140", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,12 +73,16 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.ethereal.com/cgi-bin/viewcvs.cgi/ethereal/packet-bgp.c.diff?r1=1.68&r2=1.69", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-290.html", diff --git a/CVE-2002/CVE-2002-13xx/CVE-2002-1356.json b/CVE-2002/CVE-2002-13xx/CVE-2002-1356.json index 3857638ed40..4b5c350b1f1 100644 --- a/CVE-2002/CVE-2002-13xx/CVE-2002-1356.json +++ b/CVE-2002/CVE-2002-13xx/CVE-2002-1356.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1356", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-23T05:00:00.000", - "lastModified": "2008-09-05T20:30:22.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,12 +73,16 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.ethereal.com/cgi-bin/viewcvs.cgi/ethereal/packet-lmp.c#rev1.13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-290.html", diff --git a/CVE-2002/CVE-2002-14xx/CVE-2002-1429.json b/CVE-2002/CVE-2002-14xx/CVE-2002-1429.json index 7f6229bf685..17474c24e30 100644 --- a/CVE-2002/CVE-2002-14xx/CVE-2002-1429.json +++ b/CVE-2002/CVE-2002-14xx/CVE-2002-1429.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1429", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-11T04:00:00.000", - "lastModified": "2008-09-05T20:30:34.733", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,7 +82,10 @@ }, { "url": "http://endity.com/board/index.php?act=ST&f=3&t=68&s=363128162825b2d7fcf60c9cd2a292fe", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.iss.net/security_center/static/9739.php", diff --git a/CVE-2002/CVE-2002-14xx/CVE-2002-1477.json b/CVE-2002/CVE-2002-14xx/CVE-2002-1477.json index 9fd2a4f119e..c2282d37916 100644 --- a/CVE-2002/CVE-2002-14xx/CVE-2002-1477.json +++ b/CVE-2002/CVE-2002-14xx/CVE-2002-1477.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1477", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-22T04:00:00.000", - "lastModified": "2008-09-05T20:30:42.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -143,7 +143,10 @@ }, { "url": "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/5627", diff --git a/CVE-2002/CVE-2002-14xx/CVE-2002-1478.json b/CVE-2002/CVE-2002-14xx/CVE-2002-1478.json index eaf4de96f3b..52146b78cf8 100644 --- a/CVE-2002/CVE-2002-14xx/CVE-2002-1478.json +++ b/CVE-2002/CVE-2002-14xx/CVE-2002-1478.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1478", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-22T04:00:00.000", - "lastModified": "2008-09-05T20:30:42.360", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -139,7 +139,10 @@ }, { "url": "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/5630", diff --git a/CVE-2002/CVE-2002-14xx/CVE-2002-1479.json b/CVE-2002/CVE-2002-14xx/CVE-2002-1479.json index c02a1054be9..7af63cab7eb 100644 --- a/CVE-2002/CVE-2002-14xx/CVE-2002-1479.json +++ b/CVE-2002/CVE-2002-14xx/CVE-2002-1479.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1479", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-22T04:00:00.000", - "lastModified": "2017-07-19T01:29:00.550", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -135,7 +135,10 @@ }, { "url": "http://www.knights-of-the-routing-table.org/advisories/krt_001_20020903_cacti.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/5628", diff --git a/CVE-2002/CVE-2002-16xx/CVE-2002-1682.json b/CVE-2002/CVE-2002-16xx/CVE-2002-1682.json index d8872b5de1a..e0dde6c1ec9 100644 --- a/CVE-2002/CVE-2002-16xx/CVE-2002-1682.json +++ b/CVE-2002/CVE-2002-16xx/CVE-2002-1682.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1682", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:20.213", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:55:54.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -71,17 +93,27 @@ "url": "http://www.securiteam.com/windowsntfocus/5SP0P0K60C.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/3927", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7968", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-16xx/CVE-2002-1697.json b/CVE-2002/CVE-2002-16xx/CVE-2002-1697.json index 84035fec454..f3d0100b735 100644 --- a/CVE-2002/CVE-2002-16xx/CVE-2002-1697.json +++ b/CVE-2002/CVE-2002-16xx/CVE-2002-1697.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1697", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:20.713", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:51:00.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -58,33 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:vtun:vtun:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2680BB11-FA30-4403-91EF-009243B1DE3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:vtun:vtun:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2A8F5713-0239-4A75-9366-691F38C012DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:vtun:vtun:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "EF7C0E92-7041-41E7-9F08-5B3FDA4906D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:vtun:vtun:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "67FE738C-B63C-4B10-88CB-8D391A10AC47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:vtun:vtun:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "47999E97-4E42-49A3-BC6F-52C2C21D3D42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:vtun:vtun:2.5_b1:*:*:*:*:*:*:*", - "matchCriteriaId": "0034A6FB-92CE-43EB-A1E1-DEB5F2316588" + "criteria": "cpe:2.3:a:vtun_project:vtun:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "versionEndIncluding": "2.5", + "matchCriteriaId": "0B8860CA-17EC-46B9-ADD1-11C8D7CBBA5C" } ] } @@ -94,15 +93,28 @@ "references": [ { "url": "http://seclists.org/bugtraq/2002/Jan/0119.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/3845", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7904", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1739.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1739.json index 826c3898927..fd746b242ea 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1739.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1739.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1739", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:23.273", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:50:56.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -58,43 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B1B8B55A-93D3-4456-8B84-DA437F7E18FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0:*:pro:*:*:*:*:*", - "matchCriteriaId": "EAD8D901-F60B-400B-A51E-0881D0077FBF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E419B0EF-DB52-43D7-906C-744CEF5D8E3F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "EFB3DE93-03F4-4543-AF4D-A76C0AA86D4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "505D587A-DD1A-4C31-9C8E-D407CECF3545" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E131AB50-9C43-4AF9-8637-618172FC1769" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "596930EE-960D-4307-B726-73DEBE5ABF36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:alt-n:mdaemon:5.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4A221378-1198-4FBA-9857-05BA2E5E4B78" + "criteria": "cpe:2.3:a:mdaemon:mdaemon:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndIncluding": "5.0.6", + "matchCriteriaId": "CA13175A-BDF0-4922-B0D2-B212F95587E0" } ] } @@ -102,13 +91,31 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/271374", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.securityfocus.com/bid/4686", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9025", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1750.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1750.json index cf2a493e8de..16dc969a0a3 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1750.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1750.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1750", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:23.917", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:57:59.273", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,18 +17,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", - "confidentialityImpact": "NONE", + "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", + "baseSeverity": "HIGH", "exploitabilityScore": 10.0, - "impactScore": 2.9, + "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cgiscript.net:csguestbook:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BDABDE21-8BC3-4E78-826E-A439F9D19D9A" + "criteria": "cpe:2.3:a:cgiscript:csguestbook:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "37F43BD3-53F2-4D47-9429-C32FC82F5BA8" } ] } @@ -69,15 +69,27 @@ "references": [ { "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00106.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/4448", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8636", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1752.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1752.json index 65c94fdd319..3b374fc7d2c 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1752.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1752.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1752", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:24.010", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:57:48.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,18 +17,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", - "confidentialityImpact": "NONE", + "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", + "baseSeverity": "HIGH", "exploitabilityScore": 10.0, - "impactScore": 2.9, + "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cgiscript.net:cschat-r-box:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D0DFA08D-7F50-432F-8E5F-2441353CAEF9" + "criteria": "cpe:2.3:a:cgiscript:cschat-r-box:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ACEAA7C2-12F4-4107-9694-5FF24A633BEC" } ] } @@ -69,15 +69,27 @@ "references": [ { "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00106.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/4452", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8636", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1753.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1753.json index 673e9509461..e9c71ba2cba 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1753.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1753.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1753", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:24.070", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:56:05.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,18 +17,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", - "confidentialityImpact": "NONE", + "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", + "baseSeverity": "HIGH", "exploitabilityScore": 10.0, - "impactScore": 2.9, + "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,13 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cgiscript.net:csnews:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DC5479CB-ABC0-4DE1-A173-C73377592CD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cgiscript.net:csnewspro:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3A8CA310-47F2-4890-B8F4-BB604D3B3522" + "criteria": "cpe:2.3:a:cgiscript:csnews_professional:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFA79252-F2F1-4418-B596-557860649C36" } ] } @@ -74,15 +69,27 @@ "references": [ { "url": "http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00106.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/4451", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8636", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-18xx/CVE-2002-1872.json b/CVE-2002/CVE-2002-18xx/CVE-2002-1872.json index 1d779556ca4..c0233951797 100644 --- a/CVE-2002/CVE-2002-18xx/CVE-2002-1872.json +++ b/CVE-2002/CVE-2002-18xx/CVE-2002-1872.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1872", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:44.027", + "lastModified": "2024-02-14T15:50:51.787", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -116,20 +138,34 @@ "url": "http://online.securityfocus.com/archive/1/298361", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/10542.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.nextgenss.com/papers/tp-SQL2000.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/6097", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1910.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1910.json index 7641d90c22c..b66a0ba4158 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1910.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1910.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1910", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:49.713", + "lastModified": "2024-02-14T15:50:47.760", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -58,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:click2learn:ingenium_learning_management_system:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3CA58902-35D8-48B6-816A-EB2640E3B10E" + "criteria": "cpe:2.3:a:click-2:ingenium_learning_management_system:5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFC5CF8-2137-4FCD-BAF8-3C329A1F78D1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:click2learn:ingenium_learning_management_system:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8139F36D-56DA-44A3-A214-304FA5F2731C" + "criteria": "cpe:2.3:a:click-2:ingenium_learning_management_system:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D9A0C9-1A0C-4405-B2EA-673F629129EA" } ] } @@ -72,15 +94,30 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/295309", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.iss.net/security_center/static/10389.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/5970", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1934.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1934.json index 58b7aee705f..55d99d8a916 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1934.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1934.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1934", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:53.697", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -87,6 +87,10 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/288383", + "source": "cve@mitre.org" + }, { "url": "http://www.iss.net/security_center/static/9948.php", "source": "cve@mitre.org" @@ -99,7 +103,8 @@ "url": "http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1935.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1935.json index 477595056c1..4e001623080 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1935.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1935.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1935", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:53.857", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -87,6 +87,10 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/288383", + "source": "cve@mitre.org" + }, { "url": "http://www.iss.net/security_center/static/9949.php", "source": "cve@mitre.org" @@ -99,7 +103,8 @@ "url": "http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_SIP-based_IP_phones.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1946.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1946.json index 312e555f287..b60fe8ea5d2 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1946.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1946.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1946", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:55.497", + "lastModified": "2024-02-14T15:50:44.427", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:videsh_sanchar_nigam_limited:integrated_dialer_software:1.2.000:*:*:*:*:*:*:*", - "matchCriteriaId": "517CF5BC-1309-4FA8-B84D-16899295CB26" + "criteria": "cpe:2.3:a:tata:integrated_dialer:1.2.000:*:*:*:*:*:*:*", + "matchCriteriaId": "E8BB8403-DFE3-435D-8687-2A3891AD0AB8" } ] } @@ -69,11 +91,17 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0438.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.iss.net/security_center/static/10517.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json index 83f0f760836..a1fc79d7de1 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1975.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1975", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:59.917", + "lastModified": "2024-02-14T15:50:35.067", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,13 +81,46 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sharp:zaurus:sl-5000d:*:*:*:*:*:*:*", - "matchCriteriaId": "CB8D34DE-DC84-4B34-83DC-3637CD644348" - }, + "criteria": "cpe:2.3:o:sharp:zaurus_sl-5000d_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D77A45A8-14DE-4AB0-8E2B-01F3D2F24D04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sharp:zaurus_sl-5000d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDCC07C5-0633-49E0-B168-05CA8A72CE5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sharp:zaurus:sl-5500:*:*:*:*:*:*:*", - "matchCriteriaId": "533F95A4-441A-44D7-A99D-F9EAE522D56C" + "criteria": "cpe:2.3:o:sharp:zaurus_sl-5500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76E071CE-EDDA-46F6-97D0-AF49FC1AABC7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sharp:zaurus_sl-5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "304BBA12-4A60-4F10-8743-C6E05ECFBF03" } ] } @@ -72,13 +128,30 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/281437", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.iss.net/security_center/static/9535.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/5201", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2032.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2032.json index 3c6b92efffc..c83205adcb6 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2032.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2032.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2032", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:09.213", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -136,7 +136,8 @@ "url": "http://www.securityfaq.com/unixfocus/5OP041P6BE.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2094.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2094.json index 57e9602e6a9..0d9c2ba824b 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2094.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2094.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2094", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:18.993", + "lastModified": "2024-02-14T15:07:37.047", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:joe_testa:hellbent:01:*:*:*:*:*:*:*", - "matchCriteriaId": "D65CEFAB-014F-4A67-BE8F-31D62F43B394" + "criteria": "cpe:2.3:a:joetesta:hellbent:0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BF5CF158-B6BF-4B2F-BFB7-74627CD4BB1B" } ] } @@ -71,6 +71,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0228.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -80,6 +81,7 @@ "url": "http://www.iss.net/security_center/static/7930.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, @@ -87,7 +89,10 @@ "url": "http://www.securityfocus.com/bid/3908", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2002/CVE-2002-21xx/CVE-2002-2117.json b/CVE-2002/CVE-2002-21xx/CVE-2002-2117.json index 14276af5752..e4790b9e9da 100644 --- a/CVE-2002/CVE-2002-21xx/CVE-2002-2117.json +++ b/CVE-2002/CVE-2002-21xx/CVE-2002-2117.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2117", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:22.603", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://www.safehack.com/Advisory/sh_XPDOS500.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2002/CVE-2002-22xx/CVE-2002-2217.json b/CVE-2002/CVE-2002-22xx/CVE-2002-2217.json index 5bc098374fc..938af826319 100644 --- a/CVE-2002/CVE-2002-22xx/CVE-2002-2217.json +++ b/CVE-2002/CVE-2002-22xx/CVE-2002-2217.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2217", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-10-19T01:29:01.407", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,6 +78,13 @@ "Exploit" ] }, + { + "url": "http://www.frog-man.org/tutos/WSC-WebPortal.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/19896", "source": "cve@mitre.org", diff --git a/CVE-2003/CVE-2003-00xx/CVE-2003-0078.json b/CVE-2003/CVE-2003-00xx/CVE-2003-0078.json index fa1dcb2ba1c..791d721e528 100644 --- a/CVE-2003/CVE-2003-00xx/CVE-2003-0078.json +++ b/CVE-2003/CVE-2003-00xx/CVE-2003-0078.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0078", "sourceIdentifier": "cve@mitre.org", "published": "2003-03-03T05:00:00.000", - "lastModified": "2016-10-18T02:29:16.643", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:07:42.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -62,78 +62,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", - "matchCriteriaId": "14D983EC-61B0-4FD9-89B5-9878E4CE4405" + "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.9.6i", + "matchCriteriaId": "7693CC10-F1E9-47D4-81C0-EF0E3D9CAE10" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", - "matchCriteriaId": "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D" + "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", + "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BC4C5F05-BC0B-478D-9A6F-7C804777BA41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "4EDB5A09-BE86-4352-9799-A875649EDB7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", - "matchCriteriaId": "F03FA9C0-24C7-46AC-92EC-7834BC34C79B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B5E4742C-A983-4F00-B24F-AB280C0E876D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", - "matchCriteriaId": "8A0628DF-3A4C-4078-B615-22260671EABF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", - "matchCriteriaId": "962FCB86-15AD-4399-8B7D-EC1DEA919C59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", - "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", - "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", - "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", - "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C" + "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:-:*:*:*:*:*:*", + "matchCriteriaId": "CC626D0B-6D4F-4727-8933-B9EE7546ABA5" }, { "vulnerable": true, @@ -149,6 +90,21 @@ "vulnerable": true, "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*", + "matchCriteriaId": "9644CC68-1E91-45E7-8C53-1E3FC9976A4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*", + "matchCriteriaId": "9B1B98C4-1FFD-4A7C-AA86-A34BC6F7AB31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*", + "matchCriteriaId": "73934717-2DA3-4614-A076-D6EDA5EB0626" } ] } @@ -190,11 +146,6 @@ "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", - "matchCriteriaId": "09BFA20B-2F31-4246-8F74-63DF1DB884EE" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", @@ -218,36 +169,58 @@ "references": [ { "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-001.txt.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20030501-01-I", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000570", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104567627211904&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104568426824439&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104577183206905&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ciac.org/ciac/bulletins/n-051.shtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2003/dsa-253", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -255,52 +228,90 @@ "url": "http://www.iss.net/security_center/static/11369.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-2874.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:020", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openssl.org/news/secadv_20030219.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/3945", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-062.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-063.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-082.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-104.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-205.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/6884", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.trustix.org/errata/2003/0005", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-00xx/CVE-2003-0081.json b/CVE-2003/CVE-2003-00xx/CVE-2003-0081.json index cb738703ae1..174909c65ea 100644 --- a/CVE-2003/CVE-2003-00xx/CVE-2003-0081.json +++ b/CVE-2003/CVE-2003-00xx/CVE-2003-0081.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0081", "sourceIdentifier": "cve@mitre.org", "published": "2003-03-18T05:00:00.000", - "lastModified": "2017-10-10T01:30:14.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -142,7 +142,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-01xx/CVE-2003-0159.json b/CVE-2003/CVE-2003-01xx/CVE-2003-0159.json index 14a6d92ac71..405d0881eca 100644 --- a/CVE-2003/CVE-2003-01xx/CVE-2003-0159.json +++ b/CVE-2003/CVE-2003-01xx/CVE-2003-0159.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0159", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-02T05:00:00.000", - "lastModified": "2017-10-11T01:29:06.370", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -126,7 +126,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-02xx/CVE-2003-0215.json b/CVE-2003/CVE-2003-02xx/CVE-2003-0215.json index 8efe2c04d28..6b58ca81b18 100644 --- a/CVE-2003/CVE-2003-02xx/CVE-2003-0215.json +++ b/CVE-2003/CVE-2003-02xx/CVE-2003-0215.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0215", "sourceIdentifier": "cve@mitre.org", "published": "2003-05-12T04:00:00.000", - "lastModified": "2016-10-18T02:30:48.537", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,7 +85,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2003/CVE-2003-02xx/CVE-2003-0272.json b/CVE-2003/CVE-2003-02xx/CVE-2003-0272.json index 7b99b16e190..24b7d49f4db 100644 --- a/CVE-2003/CVE-2003-02xx/CVE-2003-0272.json +++ b/CVE-2003/CVE-2003-02xx/CVE-2003-0272.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0272", "sourceIdentifier": "cve@mitre.org", "published": "2003-05-27T04:00:00.000", - "lastModified": "2016-10-18T02:31:31.213", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -92,7 +92,10 @@ }, { "url": "http://www.frog-man.org/tutos/miniPortail.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-03xx/CVE-2003-0356.json b/CVE-2003/CVE-2003-03xx/CVE-2003-0356.json index 5500e8bf39e..fc239a95ecd 100644 --- a/CVE-2003/CVE-2003-03xx/CVE-2003-0356.json +++ b/CVE-2003/CVE-2003-03xx/CVE-2003-0356.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0356", "sourceIdentifier": "cve@mitre.org", "published": "2003-06-09T04:00:00.000", - "lastModified": "2017-10-11T01:29:09.433", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T01:17:43.863", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -85,7 +85,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-03xx/CVE-2003-0357.json b/CVE-2003/CVE-2003-03xx/CVE-2003-0357.json index afbab446bb9..f7ec9a53685 100644 --- a/CVE-2003/CVE-2003-03xx/CVE-2003-0357.json +++ b/CVE-2003/CVE-2003-03xx/CVE-2003-0357.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0357", "sourceIdentifier": "cve@mitre.org", "published": "2003-06-09T04:00:00.000", - "lastModified": "2017-10-11T01:29:09.510", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -89,7 +89,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-04xx/CVE-2003-0428.json b/CVE-2003/CVE-2003-04xx/CVE-2003-0428.json index ec3d10545cf..978757a0286 100644 --- a/CVE-2003/CVE-2003-04xx/CVE-2003-0428.json +++ b/CVE-2003/CVE-2003-04xx/CVE-2003-0428.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0428", "sourceIdentifier": "cve@mitre.org", "published": "2003-07-24T04:00:00.000", - "lastModified": "2017-10-11T01:29:09.807", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,6 +80,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/9007", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-324", "source": "cve@mitre.org", @@ -93,7 +97,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-04xx/CVE-2003-0429.json b/CVE-2003/CVE-2003-04xx/CVE-2003-0429.json index 23ca720cc92..4058c784aed 100644 --- a/CVE-2003/CVE-2003-04xx/CVE-2003-0429.json +++ b/CVE-2003/CVE-2003-04xx/CVE-2003-0429.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0429", "sourceIdentifier": "cve@mitre.org", "published": "2003-07-24T04:00:00.000", - "lastModified": "2017-10-11T01:29:09.870", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,6 +80,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/9007", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-324", "source": "cve@mitre.org", @@ -93,7 +97,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-04xx/CVE-2003-0430.json b/CVE-2003/CVE-2003-04xx/CVE-2003-0430.json index d2bebc4ea48..1c7a0b4b71b 100644 --- a/CVE-2003/CVE-2003-04xx/CVE-2003-0430.json +++ b/CVE-2003/CVE-2003-04xx/CVE-2003-0430.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0430", "sourceIdentifier": "cve@mitre.org", "published": "2003-07-24T04:00:00.000", - "lastModified": "2017-10-11T01:29:09.933", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,12 +80,17 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/9007", + "source": "cve@mitre.org" + }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00010.html", "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-04xx/CVE-2003-0431.json b/CVE-2003/CVE-2003-04xx/CVE-2003-0431.json index 8c44480bb2b..bb3521a0c57 100644 --- a/CVE-2003/CVE-2003-04xx/CVE-2003-0431.json +++ b/CVE-2003/CVE-2003-04xx/CVE-2003-0431.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0431", "sourceIdentifier": "cve@mitre.org", "published": "2003-07-24T04:00:00.000", - "lastModified": "2017-10-11T01:29:09.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,6 +80,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/9007", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-324", "source": "cve@mitre.org", @@ -93,7 +97,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-04xx/CVE-2003-0432.json b/CVE-2003/CVE-2003-04xx/CVE-2003-0432.json index 71d8154e61e..cbdaae4d9c1 100644 --- a/CVE-2003/CVE-2003-04xx/CVE-2003-0432.json +++ b/CVE-2003/CVE-2003-04xx/CVE-2003-0432.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0432", "sourceIdentifier": "cve@mitre.org", "published": "2003-07-24T04:00:00.000", - "lastModified": "2017-10-11T01:29:10.073", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,6 +80,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/9007", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-324", "source": "cve@mitre.org", @@ -93,7 +97,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-07xx/CVE-2003-0726.json b/CVE-2003/CVE-2003-07xx/CVE-2003-0726.json index b4a9c5b6d09..d5e0db5c808 100644 --- a/CVE-2003/CVE-2003-07xx/CVE-2003-0726.json +++ b/CVE-2003/CVE-2003-07xx/CVE-2003-0726.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0726", "sourceIdentifier": "cve@mitre.org", "published": "2003-10-20T04:00:00.000", - "lastModified": "2017-07-11T01:29:35.603", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -112,7 +112,8 @@ "tags": [ "Exploit", "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-08xx/CVE-2003-0899.json b/CVE-2003/CVE-2003-08xx/CVE-2003-0899.json index c88091544b1..d0b6ec82a45 100644 --- a/CVE-2003/CVE-2003-08xx/CVE-2003-0899.json +++ b/CVE-2003/CVE-2003-08xx/CVE-2003-0899.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0899", "sourceIdentifier": "cve@mitre.org", "published": "2003-11-03T05:00:00.000", - "lastModified": "2024-02-02T14:01:01.890", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "evaluatorSolution": "This vulnerability is addressed in the following product release:\nAcme Labs, thttpd, 2.24", "descriptions": [ @@ -145,7 +145,8 @@ "url": "http://www.texonet.com/advisories/TEXONET-20030908.txt", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-09xx/CVE-2003-0925.json b/CVE-2003/CVE-2003-09xx/CVE-2003-0925.json index aa58ba76fad..69a6a9e60ce 100644 --- a/CVE-2003/CVE-2003-09xx/CVE-2003-0925.json +++ b/CVE-2003/CVE-2003-09xx/CVE-2003-0925.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0925", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-01T05:00:00.000", - "lastModified": "2017-10-11T01:29:16.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10531", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-407", "source": "cve@mitre.org" @@ -159,7 +163,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-09xx/CVE-2003-0926.json b/CVE-2003/CVE-2003-09xx/CVE-2003-0926.json index 4c6e69b8e72..51d4521daec 100644 --- a/CVE-2003/CVE-2003-09xx/CVE-2003-0926.json +++ b/CVE-2003/CVE-2003-09xx/CVE-2003-0926.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0926", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-01T05:00:00.000", - "lastModified": "2017-10-11T01:29:16.167", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10531", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-407", "source": "cve@mitre.org" @@ -159,7 +163,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-09xx/CVE-2003-0927.json b/CVE-2003/CVE-2003-09xx/CVE-2003-0927.json index 9f5d83e176e..8802086251c 100644 --- a/CVE-2003/CVE-2003-09xx/CVE-2003-0927.json +++ b/CVE-2003/CVE-2003-09xx/CVE-2003-0927.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0927", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-01T05:00:00.000", - "lastModified": "2017-10-11T01:29:16.230", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10531", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2003/dsa-407", "source": "cve@mitre.org" @@ -159,7 +163,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-09xx/CVE-2003-0937.json b/CVE-2003/CVE-2003-09xx/CVE-2003-0937.json index d2f2829c038..6c875879e63 100644 --- a/CVE-2003/CVE-2003-09xx/CVE-2003-0937.json +++ b/CVE-2003/CVE-2003-09xx/CVE-2003-0937.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0937", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-15T05:00:00.000", - "lastModified": "2016-10-18T02:38:25.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2003/CVE-2003-10xx/CVE-2003-1012.json b/CVE-2003/CVE-2003-10xx/CVE-2003-1012.json index 8e97615c04c..552db543779 100644 --- a/CVE-2003/CVE-2003-10xx/CVE-2003-1012.json +++ b/CVE-2003/CVE-2003-10xx/CVE-2003-1012.json @@ -2,7 +2,7 @@ "id": "CVE-2003-1012", "sourceIdentifier": "cve@mitre.org", "published": "2004-01-05T05:00:00.000", - "lastModified": "2017-10-11T01:29:17.247", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -163,6 +163,18 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000801", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10531", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/10568", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/10570", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2004/dsa-407", "source": "cve@mitre.org", @@ -176,7 +188,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json b/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json index 42644ff3197..af1a4f9381f 100644 --- a/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json +++ b/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json @@ -2,7 +2,7 @@ "id": "CVE-2003-1013", "sourceIdentifier": "cve@mitre.org", "published": "2004-01-05T05:00:00.000", - "lastModified": "2024-01-21T01:26:54.323", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -149,7 +149,8 @@ "tags": [ "Broken Link", "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-11xx/CVE-2003-1187.json b/CVE-2003/CVE-2003-11xx/CVE-2003-1187.json index b7837da9ff7..9895883bd7c 100644 --- a/CVE-2003/CVE-2003-11xx/CVE-2003-1187.json +++ b/CVE-2003/CVE-2003-11xx/CVE-2003-1187.json @@ -2,7 +2,7 @@ "id": "CVE-2003-1187", "sourceIdentifier": "cve@mitre.org", "published": "2003-11-02T05:00:00.000", - "lastModified": "2017-07-11T01:29:48.837", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2003/CVE-2003-15xx/CVE-2003-1503.json b/CVE-2003/CVE-2003-15xx/CVE-2003-1503.json index 40e9b222f85..4731a5a5efe 100644 --- a/CVE-2003/CVE-2003-15xx/CVE-2003-1503.json +++ b/CVE-2003/CVE-2003-15xx/CVE-2003-1503.json @@ -2,7 +2,7 @@ "id": "CVE-2003-1503", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-31T05:00:00.000", - "lastModified": "2017-07-29T01:29:14.827", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0059.html", "source": "cve@mitre.org" }, + { + "url": "http://www.digitalpranksters.com/advisories/aol/AIMProtocolBO.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/8825", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-00xx/CVE-2004-0029.json b/CVE-2004/CVE-2004-00xx/CVE-2004-0029.json index 5db16a3c3fc..2cf5593f221 100644 --- a/CVE-2004/CVE-2004-00xx/CVE-2004-0029.json +++ b/CVE-2004/CVE-2004-00xx/CVE-2004-0029.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0029", "sourceIdentifier": "cve@mitre.org", "published": "2004-01-20T05:00:00.000", - "lastModified": "2017-07-11T01:29:52.260", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,8 +75,19 @@ "url": "http://marc.info/?l=bugtraq&m=107340897710308&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10566", + "source": "cve@mitre.org" + }, { "url": "http://www.excluded.org/advisories/advisory05.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/3424", "source": "cve@mitre.org" }, { diff --git a/CVE-2004/CVE-2004-01xx/CVE-2004-0176.json b/CVE-2004/CVE-2004-01xx/CVE-2004-0176.json index 8d2a7f17863..a18b3f22bd7 100644 --- a/CVE-2004/CVE-2004-01xx/CVE-2004-0176.json +++ b/CVE-2004/CVE-2004-01xx/CVE-2004-0176.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0176", "sourceIdentifier": "cve@mitre.org", "published": "2004-05-04T04:00:00.000", - "lastModified": "2017-10-11T01:29:22.293", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -202,6 +202,10 @@ "url": "http://marc.info/?l=bugtraq&m=108213710306260&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11185", + "source": "cve@mitre.org" + }, { "url": "http://security.e-matters.de/advisories/032004.html", "source": "cve@mitre.org" @@ -220,7 +224,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.kb.cert.org/vuls/id/119876", @@ -289,6 +296,10 @@ "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:024", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/6893", + "source": "cve@mitre.org" + }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-136.html", "source": "cve@mitre.org" diff --git a/CVE-2004/CVE-2004-01xx/CVE-2004-0185.json b/CVE-2004/CVE-2004-01xx/CVE-2004-0185.json index 56c843e6072..e1ec5005ea0 100644 --- a/CVE-2004/CVE-2004-01xx/CVE-2004-0185.json +++ b/CVE-2004/CVE-2004-01xx/CVE-2004-0185.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0185", "sourceIdentifier": "cve@mitre.org", "published": "2004-03-15T05:00:00.000", - "lastModified": "2017-10-10T01:30:18.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,7 +80,10 @@ }, { "url": "http://unixpunx.org/txt/exploits_archive/packetstorm/0310-advisories/wuftpd-skey.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.debian.org/security/2004/dsa-457", diff --git a/CVE-2004/CVE-2004-02xx/CVE-2004-0243.json b/CVE-2004/CVE-2004-02xx/CVE-2004-0243.json index 6db593f8fdd..ec048eb8b4f 100644 --- a/CVE-2004/CVE-2004-02xx/CVE-2004-0243.json +++ b/CVE-2004/CVE-2004-02xx/CVE-2004-0243.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0243", "sourceIdentifier": "cve@mitre.org", "published": "2004-11-23T05:00:00.000", - "lastModified": "2017-07-11T01:30:00.337", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T14:30:59.197", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -64,6 +64,13 @@ "vulnerable": true, "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.3", + "versionEndIncluding": "5.1", + "matchCriteriaId": "C6FCB46F-45F5-4B7D-805E-588DE9F441D5" } ] } @@ -73,15 +80,25 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2004-02/0313.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=107583269206044&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15172", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-02xx/CVE-2004-0267.json b/CVE-2004/CVE-2004-02xx/CVE-2004-0267.json index 48cb0d3d6c0..8d99477fe01 100644 --- a/CVE-2004/CVE-2004-02xx/CVE-2004-0267.json +++ b/CVE-2004/CVE-2004-02xx/CVE-2004-0267.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0267", "sourceIdentifier": "cve@mitre.org", "published": "2004-11-23T05:00:00.000", - "lastModified": "2021-04-09T17:00:09.303", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,8 +75,27 @@ "url": "http://marc.info/?l=bugtraq&m=107635584431518&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10833", + "source": "cve@mitre.org" + }, { "url": "http://www.excluded.org/advisories/advisory10.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/4735", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/4855", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/4856", "source": "cve@mitre.org" }, { diff --git a/CVE-2004/CVE-2004-02xx/CVE-2004-0294.json b/CVE-2004/CVE-2004-02xx/CVE-2004-0294.json index 80d842f8289..22503a5c65b 100644 --- a/CVE-2004/CVE-2004-02xx/CVE-2004-0294.json +++ b/CVE-2004/CVE-2004-02xx/CVE-2004-0294.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0294", "sourceIdentifier": "cve@mitre.org", "published": "2004-11-23T05:00:00.000", - "lastModified": "2017-07-11T01:30:02.837", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T14:32:00.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yabb:yabb:1_gold_-_sp_1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1D28B213-1BC7-4FB1-84B1-31A5EB87F886" + "criteria": "cpe:2.3:a:yabbforumsoftware:yet_another_bulletin_board:1.0:sp1.3.1:*:*:*:*:*:*", + "matchCriteriaId": "C3A32E68-1840-4D96-BD69-7312A4DD49DD" } ] } @@ -73,18 +73,28 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=107703591314745&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/9677", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15236", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-03xx/CVE-2004-0365.json b/CVE-2004/CVE-2004-03xx/CVE-2004-0365.json index 2d1b6d6c0e4..135278f5eb6 100644 --- a/CVE-2004/CVE-2004-03xx/CVE-2004-0365.json +++ b/CVE-2004/CVE-2004-03xx/CVE-2004-0365.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0365", "sourceIdentifier": "cve@mitre.org", "published": "2004-05-04T04:00:00.000", - "lastModified": "2023-12-28T15:33:14.503", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -141,7 +141,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-03xx/CVE-2004-0367.json b/CVE-2004/CVE-2004-03xx/CVE-2004-0367.json index b3c7e8cc691..6df0d3cc628 100644 --- a/CVE-2004/CVE-2004-03xx/CVE-2004-0367.json +++ b/CVE-2004/CVE-2004-03xx/CVE-2004-0367.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0367", "sourceIdentifier": "cve@mitre.org", "published": "2004-05-04T04:00:00.000", - "lastModified": "2017-10-11T01:29:25.027", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -197,17 +197,27 @@ "url": "http://marc.info/?l=bugtraq&m=108058005324316&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11185", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200403-07.xml", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.kb.cert.org/vuls/id/792286", diff --git a/CVE-2004/CVE-2004-04xx/CVE-2004-0482.json b/CVE-2004/CVE-2004-04xx/CVE-2004-0482.json index ef6f0891b75..589c2031d7f 100644 --- a/CVE-2004/CVE-2004-04xx/CVE-2004-0482.json +++ b/CVE-2004/CVE-2004-04xx/CVE-2004-0482.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0482", "sourceIdentifier": "cve@mitre.org", "published": "2004-07-07T04:00:00.000", - "lastModified": "2017-07-11T01:30:11.650", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -99,9 +99,16 @@ "source": "cve@mitre.org" }, { - "url": "http://www.deprotect.com/advisories/DEPROTECT-20041305.txt", + "url": "http://secunia.com/advisories/11605", "source": "cve@mitre.org" }, + { + "url": "http://www.deprotect.com/advisories/DEPROTECT-20041305.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.openbsd.org/errata34.html", "source": "cve@mitre.org" @@ -110,6 +117,10 @@ "url": "http://www.openbsd.org/errata35.html", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/6114", + "source": "cve@mitre.org" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16226", "source": "cve@mitre.org" diff --git a/CVE-2004/CVE-2004-05xx/CVE-2004-0504.json b/CVE-2004/CVE-2004-05xx/CVE-2004-0504.json index 30f8332588b..e65d001809c 100644 --- a/CVE-2004/CVE-2004-05xx/CVE-2004-0504.json +++ b/CVE-2004/CVE-2004-05xx/CVE-2004-0504.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0504", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-18T04:00:00.000", - "lastModified": "2017-10-11T01:29:26.917", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -103,6 +103,18 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11608", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11776", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11836", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200406-01.xml", "source": "cve@mitre.org", @@ -120,10 +132,20 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00014.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.ethereal.com/lists/ethereal-users/200405/msg00018.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/6131", "source": "cve@mitre.org" }, { diff --git a/CVE-2004/CVE-2004-05xx/CVE-2004-0505.json b/CVE-2004/CVE-2004-05xx/CVE-2004-0505.json index 649388357e8..be490cec802 100644 --- a/CVE-2004/CVE-2004-05xx/CVE-2004-0505.json +++ b/CVE-2004/CVE-2004-05xx/CVE-2004-0505.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0505", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-18T04:00:00.000", - "lastModified": "2017-10-11T01:29:26.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -103,6 +103,18 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11608", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11776", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11836", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200406-01.xml", "source": "cve@mitre.org", @@ -120,6 +132,13 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00014.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/6132", "source": "cve@mitre.org" }, { diff --git a/CVE-2004/CVE-2004-05xx/CVE-2004-0506.json b/CVE-2004/CVE-2004-05xx/CVE-2004-0506.json index 3b2508dfddc..8193c24750a 100644 --- a/CVE-2004/CVE-2004-05xx/CVE-2004-0506.json +++ b/CVE-2004/CVE-2004-05xx/CVE-2004-0506.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0506", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-18T04:00:00.000", - "lastModified": "2017-10-11T01:29:27.073", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -103,6 +103,18 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11608", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11776", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11836", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200406-01.xml", "source": "cve@mitre.org", @@ -120,7 +132,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00014.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-234.html", diff --git a/CVE-2004/CVE-2004-05xx/CVE-2004-0507.json b/CVE-2004/CVE-2004-05xx/CVE-2004-0507.json index 7e0ca9bf9eb..b711c900c74 100644 --- a/CVE-2004/CVE-2004-05xx/CVE-2004-0507.json +++ b/CVE-2004/CVE-2004-05xx/CVE-2004-0507.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0507", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-18T04:00:00.000", - "lastModified": "2017-10-11T01:29:27.153", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,6 +107,18 @@ "url": "http://rhn.redhat.com/errata/RHSA-2004-234.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11608", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11776", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/11836", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200406-01.xml", "source": "cve@mitre.org", @@ -126,9 +138,14 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00014.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/6134", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/10347", "source": "cve@mitre.org" diff --git a/CVE-2004/CVE-2004-05xx/CVE-2004-0510.json b/CVE-2004/CVE-2004-05xx/CVE-2004-0510.json index 96c38fd51e1..c402f6b9e74 100644 --- a/CVE-2004/CVE-2004-05xx/CVE-2004-0510.json +++ b/CVE-2004/CVE-2004-05xx/CVE-2004-0510.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0510", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-23T05:00:00.000", - "lastModified": "2017-07-11T01:30:13.340", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -91,7 +91,10 @@ }, { "url": "http://www.deprotect.com/advisories/DEPROTECT-20040206.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/10758", diff --git a/CVE-2004/CVE-2004-06xx/CVE-2004-0633.json b/CVE-2004/CVE-2004-06xx/CVE-2004-0633.json index 82453fdde45..20fe49ec01b 100644 --- a/CVE-2004/CVE-2004-06xx/CVE-2004-0633.json +++ b/CVE-2004/CVE-2004-06xx/CVE-2004-0633.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0633", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-06T05:00:00.000", - "lastModified": "2017-10-11T01:29:30.090", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -144,13 +144,20 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/12024", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1010655", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00015.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml", diff --git a/CVE-2004/CVE-2004-06xx/CVE-2004-0634.json b/CVE-2004/CVE-2004-06xx/CVE-2004-0634.json index 78c850c5504..966500df268 100644 --- a/CVE-2004/CVE-2004-06xx/CVE-2004-0634.json +++ b/CVE-2004/CVE-2004-06xx/CVE-2004-0634.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0634", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-06T05:00:00.000", - "lastModified": "2017-10-11T01:29:30.153", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -144,13 +144,20 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/12024", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1010655", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00015.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml", diff --git a/CVE-2004/CVE-2004-06xx/CVE-2004-0635.json b/CVE-2004/CVE-2004-06xx/CVE-2004-0635.json index b6b0ad76704..8572cb14028 100644 --- a/CVE-2004/CVE-2004-06xx/CVE-2004-0635.json +++ b/CVE-2004/CVE-2004-06xx/CVE-2004-0635.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0635", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-06T05:00:00.000", - "lastModified": "2017-10-11T01:29:30.230", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -269,6 +269,10 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/12024", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1010655", "source": "cve@mitre.org" @@ -279,7 +283,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00015.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml", diff --git a/CVE-2004/CVE-2004-06xx/CVE-2004-0676.json b/CVE-2004/CVE-2004-06xx/CVE-2004-0676.json index c39bf9dc4e3..070ca8b404c 100644 --- a/CVE-2004/CVE-2004-06xx/CVE-2004-0676.json +++ b/CVE-2004/CVE-2004-06xx/CVE-2004-0676.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0676", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-06T04:00:00.000", - "lastModified": "2017-07-11T01:30:22.183", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,7 +83,10 @@ }, { "url": "http://www.haxorcitos.com/Fastream_advisory.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/10658", diff --git a/CVE-2004/CVE-2004-07xx/CVE-2004-0778.json b/CVE-2004/CVE-2004-07xx/CVE-2004-0778.json index 210fab33759..4a7ade40d7d 100644 --- a/CVE-2004/CVE-2004-07xx/CVE-2004-0778.json +++ b/CVE-2004/CVE-2004-07xx/CVE-2004-0778.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0778", "sourceIdentifier": "cve@mitre.org", "published": "2004-10-20T04:00:00.000", - "lastModified": "2017-10-11T01:29:33.310", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:07:46.843", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -62,108 +62,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A305C6F7-35DA-48E2-B345-14671629226D" + "criteria": "cpe:2.3:a:gnu:cvs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.11.0", + "versionEndExcluding": "1.11.17", + "matchCriteriaId": "762D9099-1589-48C0-A362-CA4501FBAD1C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F7CA6E-7D45-46C9-A437-0D0C4D3F25CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "62135DD0-140D-42C2-9302-31B5E2DE1A4A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11:*:*:*:*:*:*:*", - "matchCriteriaId": "D92B456C-5F8E-4DC2-940C-AE06B42DD3A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "37B53C85-AA0E-40DD-B477-058586197714" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.1_p1:*:*:*:*:*:*:*", - "matchCriteriaId": "D1D1234F-1BB0-432B-B7B7-A97E3ADD5561" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6D472B97-F7C2-4973-9D71-AB3CF1F8774D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9D0DCF26-59A8-46AC-99D7-97C203A0D702" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B31BAACA-7518-48D2-ADEE-F59F4569D3BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9D2748A8-5047-4338-A08E-986497AE4B1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "525C4E91-2186-4D3A-9DF0-1C6A75A3F919" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.10:*:*:*:*:*:*:*", - "matchCriteriaId": "EB231E7F-1A6F-4A79-8ED2-F6CAD311A5A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.11:*:*:*:*:*:*:*", - "matchCriteriaId": "FF7105E4-25F8-4AE3-9EDD-D44BF3E17145" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.14:*:*:*:*:*:*:*", - "matchCriteriaId": "7C22BAF3-7B9C-4B2E-B5C6-1F37B896C301" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.15:*:*:*:*:*:*:*", - "matchCriteriaId": "4AFFAE96-873A-4253-BCC7-1049DA81D9CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.11.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D1163535-583A-4504-BE7B-8919143CDF9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "766053F7-A174-4716-BF49-76B50FC79FD8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C7D2623F-167A-4976-B757-DAC4CCFAFE64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.12.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FAEC4477-D040-450E-A850-8B03C937A600" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.12.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2848AA51-9AF1-448D-955F-50B5203F7229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.12.8:*:*:*:*:*:*:*", - "matchCriteriaId": "7B66BE64-E340-4777-B877-483FEAA66988" + "criteria": "cpe:2.3:a:gnu:cvs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.12.0", + "versionEndExcluding": "1.12.9", + "matchCriteriaId": "EB6BA553-1360-4C42-B90A-C7D719F36827" } ] } @@ -175,6 +84,7 @@ "url": "http://www.idefense.com/application/poi/display?id=130&type=vulnerabilities", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -189,23 +99,36 @@ }, { "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:108", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/10955", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17001", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10688", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-11xx/CVE-2004-1106.json b/CVE-2004/CVE-2004-11xx/CVE-2004-1106.json index fb376f321de..e28d483827d 100644 --- a/CVE-2004/CVE-2004-11xx/CVE-2004-1106.json +++ b/CVE-2004/CVE-2004-11xx/CVE-2004-1106.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1106", "sourceIdentifier": "cve@mitre.org", "published": "2005-01-10T05:00:00.000", - "lastModified": "2017-07-11T01:30:44.810", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -118,7 +118,10 @@ "references": [ { "url": "http://g3cko.info/gallery2-4.patch", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=142&mode=thread&order=0&thold=0", diff --git a/CVE-2004/CVE-2004-11xx/CVE-2004-1139.json b/CVE-2004/CVE-2004-11xx/CVE-2004-1139.json index 42de20f708e..e7fd55932a0 100644 --- a/CVE-2004/CVE-2004-11xx/CVE-2004-1139.json +++ b/CVE-2004/CVE-2004-11xx/CVE-2004-1139.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1139", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-15T05:00:00.000", - "lastModified": "2017-10-11T01:29:41.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -384,6 +384,14 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/13468/", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-061.shtml", "source": "cve@mitre.org", @@ -397,7 +405,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-11xx/CVE-2004-1140.json b/CVE-2004/CVE-2004-11xx/CVE-2004-1140.json index 69e69577aa9..0c024726098 100644 --- a/CVE-2004/CVE-2004-11xx/CVE-2004-1140.json +++ b/CVE-2004/CVE-2004-11xx/CVE-2004-1140.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1140", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-10-11T01:29:42.077", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -196,6 +196,13 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/13468/", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-061.shtml", "source": "cve@mitre.org", @@ -207,7 +214,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00016.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-11xx/CVE-2004-1141.json b/CVE-2004/CVE-2004-11xx/CVE-2004-1141.json index 96f1d4196ce..d7464dee7ef 100644 --- a/CVE-2004/CVE-2004-11xx/CVE-2004-1141.json +++ b/CVE-2004/CVE-2004-11xx/CVE-2004-1141.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1141", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-10-11T01:29:42.137", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -101,6 +101,13 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/13468/", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-061.shtml", "source": "cve@mitre.org", @@ -112,7 +119,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00016.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-11xx/CVE-2004-1142.json b/CVE-2004/CVE-2004-11xx/CVE-2004-1142.json index fd18401fe48..784994cc6dc 100644 --- a/CVE-2004/CVE-2004-11xx/CVE-2004-1142.json +++ b/CVE-2004/CVE-2004-11xx/CVE-2004-1142.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1142", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-15T05:00:00.000", - "lastModified": "2017-10-11T01:29:42.217", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -384,6 +384,14 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/13468/", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-061.shtml", "source": "cve@mitre.org", @@ -405,7 +413,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-13xx/CVE-2004-1333.json b/CVE-2004/CVE-2004-13xx/CVE-2004-1333.json index 61d38174090..ec3ba8f7af4 100644 --- a/CVE-2004/CVE-2004-13xx/CVE-2004-1333.json +++ b/CVE-2004/CVE-2004-13xx/CVE-2004-1333.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1333", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-15T05:00:00.000", - "lastModified": "2018-10-03T21:29:24.057", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -582,6 +582,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17826", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/20162", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/20163", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/20202", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/20338", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2006/dsa-1067", "source": "cve@mitre.org" @@ -631,6 +651,13 @@ "Vendor Advisory" ] }, + { + "url": "http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-13xx/CVE-2004-1334.json b/CVE-2004/CVE-2004-13xx/CVE-2004-1334.json index b7648fa920e..38fdfd9bb1c 100644 --- a/CVE-2004/CVE-2004-13xx/CVE-2004-1334.json +++ b/CVE-2004/CVE-2004-13xx/CVE-2004-1334.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1334", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-15T05:00:00.000", - "lastModified": "2017-07-11T01:30:56.090", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -608,7 +608,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-13xx/CVE-2004-1335.json b/CVE-2004/CVE-2004-13xx/CVE-2004-1335.json index 7551a32c084..29127512612 100644 --- a/CVE-2004/CVE-2004-13xx/CVE-2004-1335.json +++ b/CVE-2004/CVE-2004-13xx/CVE-2004-1335.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1335", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-15T05:00:00.000", - "lastModified": "2017-10-11T01:29:44.653", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -586,6 +586,18 @@ "url": "http://marc.info/?l=bugtraq&m=110383108211524&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/20163", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/20202", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/20338", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2006/dsa-1067", "source": "cve@mitre.org" @@ -632,7 +644,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-14xx/CVE-2004-1417.json b/CVE-2004/CVE-2004-14xx/CVE-2004-1417.json index 675bd4f8baf..cd29c4860cb 100644 --- a/CVE-2004/CVE-2004-14xx/CVE-2004-1417.json +++ b/CVE-2004/CVE-2004-14xx/CVE-2004-1417.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1417", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:00.717", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -102,6 +102,14 @@ "url": "http://marc.info/?l=bugtraq&m=110383119525592&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/13619/", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.gulftech.org/?node=research&article_id=00057-12222004", "source": "cve@mitre.org", @@ -114,7 +122,8 @@ "url": "http://www.psychostats.com/forums/viewtopic.php?t=11022", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-14xx/CVE-2004-1428.json b/CVE-2004/CVE-2004-14xx/CVE-2004-1428.json index 7db11317630..d87c148bdcb 100644 --- a/CVE-2004/CVE-2004-14xx/CVE-2004-1428.json +++ b/CVE-2004/CVE-2004-14xx/CVE-2004-1428.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1428", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2024-02-13T20:01:06.527", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,7 +102,8 @@ "url": "http://www.lovebug.org/argosoft_advisory.txt", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-16xx/CVE-2004-1625.json b/CVE-2004/CVE-2004-16xx/CVE-2004-1625.json index 7d8f2d4b886..38e22508429 100644 --- a/CVE-2004/CVE-2004-16xx/CVE-2004-1625.json +++ b/CVE-2004/CVE-2004-16xx/CVE-2004-1625.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1625", "sourceIdentifier": "cve@mitre.org", "published": "2004-10-22T04:00:00.000", - "lastModified": "2017-07-11T01:31:12.090", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.lovebug.org/pgina_dos.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17836", diff --git a/CVE-2004/CVE-2004-16xx/CVE-2004-1647.json b/CVE-2004/CVE-2004-16xx/CVE-2004-1647.json index d9dcdba6b05..920eab46214 100644 --- a/CVE-2004/CVE-2004-16xx/CVE-2004-1647.json +++ b/CVE-2004/CVE-2004-16xx/CVE-2004-1647.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1647", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-30T04:00:00.000", - "lastModified": "2017-07-11T01:31:13.340", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,9 +71,19 @@ "url": "http://marc.info/?l=bugtraq&m=109414967003192&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/12407", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.criolabs.net/advisories/passprotect.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/11073", diff --git a/CVE-2004/CVE-2004-16xx/CVE-2004-1648.json b/CVE-2004/CVE-2004-16xx/CVE-2004-1648.json index c9e7854af8b..beac08c96ee 100644 --- a/CVE-2004/CVE-2004-16xx/CVE-2004-1648.json +++ b/CVE-2004/CVE-2004-16xx/CVE-2004-1648.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1648", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-31T04:00:00.000", - "lastModified": "2017-07-11T01:31:13.387", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,13 +72,22 @@ "source": "cve@mitre.org" }, { - "url": "http://www.criolabs.net/advisories/passprotect.txt", + "url": "http://secunia.com/advisories/12407", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, + { + "url": "http://www.criolabs.net/advisories/passprotect.txt", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/11073", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-17xx/CVE-2004-1761.json b/CVE-2004/CVE-2004-17xx/CVE-2004-1761.json index dfb9839eed6..9d94d793549 100644 --- a/CVE-2004/CVE-2004-17xx/CVE-2004-1761.json +++ b/CVE-2004/CVE-2004-17xx/CVE-2004-1761.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1761", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-10-11T01:29:46.357", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -207,9 +207,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11185", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.kb.cert.org/vuls/id/695486", diff --git a/CVE-2004/CVE-2004-18xx/CVE-2004-1873.json b/CVE-2004/CVE-2004-18xx/CVE-2004-1873.json index 3bd17de47a7..5af45baff39 100644 --- a/CVE-2004/CVE-2004-18xx/CVE-2004-1873.json +++ b/CVE-2004/CVE-2004-18xx/CVE-2004-1873.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1873", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2018-10-19T15:30:50.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,6 +78,13 @@ }, { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=27", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/11236", "source": "cve@mitre.org" }, { diff --git a/CVE-2004/CVE-2004-20xx/CVE-2004-2021.json b/CVE-2004/CVE-2004-20xx/CVE-2004-2021.json index 5ba0d4062b3..06db85255fc 100644 --- a/CVE-2004/CVE-2004-20xx/CVE-2004-2021.json +++ b/CVE-2004/CVE-2004-20xx/CVE-2004-2021.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2021", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:33.560", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -95,12 +95,23 @@ "url": "http://marc.info/?l=bugtraq&m=108482902101519&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11624", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1010176", "source": "cve@mitre.org" }, { "url": "http://www.excluded.org/advisories/advisory13.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/6308", "source": "cve@mitre.org" }, { diff --git a/CVE-2004/CVE-2004-20xx/CVE-2004-2092.json b/CVE-2004/CVE-2004-20xx/CVE-2004-2092.json index d98269795bd..fddd5a26d3e 100644 --- a/CVE-2004/CVE-2004-20xx/CVE-2004-2092.json +++ b/CVE-2004/CVE-2004-20xx/CVE-2004-2092.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2092", "sourceIdentifier": "cve@mitre.org", "published": "2004-02-09T05:00:00.000", - "lastModified": "2021-04-09T17:00:09.303", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,27 @@ "url": "http://marc.info/?l=bugtraq&m=107635584431518&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/10833", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.excluded.org/advisories/advisory10.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/3896", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/9616", "source": "cve@mitre.org" diff --git a/CVE-2004/CVE-2004-21xx/CVE-2004-2138.json b/CVE-2004/CVE-2004-21xx/CVE-2004-2138.json index 9b931310f90..879d72929d6 100644 --- a/CVE-2004/CVE-2004-21xx/CVE-2004-2138.json +++ b/CVE-2004/CVE-2004-21xx/CVE-2004-2138.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2138", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:39.687", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://www.computerknights.org/forum_viewtopic.php?2.122", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-21xx/CVE-2004-2172.json b/CVE-2004/CVE-2004-21xx/CVE-2004-2172.json index 7ce5141d0fc..09075a45199 100644 --- a/CVE-2004/CVE-2004-21xx/CVE-2004-2172.json +++ b/CVE-2004/CVE-2004-21xx/CVE-2004-2172.json @@ -2,8 +2,8 @@ "id": "CVE-2004-2172", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:41.343", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:58:13.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -58,88 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "187A49C7-29D2-4288-BC2C-1C341970DA3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_b:*:*:*:*:*:*:*", - "matchCriteriaId": "36D2726E-E2E0-4E09-85EF-20B8A4D0B557" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_b001:*:*:*:*:*:*:*", - "matchCriteriaId": "B79D2643-6362-4C21-8E14-398F89398B31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_b002:*:*:*:*:*:*:*", - "matchCriteriaId": "8F39B62F-C8DB-4CCE-8D84-487B108279E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_b003:*:*:*:*:*:*:*", - "matchCriteriaId": "5E5347E1-2820-41FB-84AF-8CCA5B9D1074" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_br:*:*:*:*:*:*:*", - "matchCriteriaId": "B514149C-3944-496C-AB23-C5C6D213A3DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_br001:*:*:*:*:*:*:*", - "matchCriteriaId": "3693B636-37C2-4096-A70E-72196355CEE0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6_br003:*:*:*:*:*:*:*", - "matchCriteriaId": "50A7DC30-A945-43A6-97BC-890E3A745D23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.5002:*:*:*:*:*:*:*", - "matchCriteriaId": "4BA9179C-B8E8-4AD8-96A3-C5A266CF3A6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.5003:*:*:*:*:*:*:*", - "matchCriteriaId": "2633071B-D162-4F9B-962F-849AC7787A8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.5003r:*:*:*:*:*:*:*", - "matchCriteriaId": "8963787A-0A12-4817-9131-75D25A2701E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.5004:*:*:*:*:*:*:*", - "matchCriteriaId": "3CA232AA-BDD2-4B9A-8AB8-E4B1C507C807" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6002:*:*:*:*:*:*:*", - "matchCriteriaId": "A8468FBB-4275-4051-9499-896EA3B2E53B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:1.6003:*:*:*:*:*:*:*", - "matchCriteriaId": "D013E775-C9FE-46E1-8DF3-414306EE7826" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1D025C09-267E-4510-9462-88220B421AAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:2.0_br000:*:*:*:*:*:*:*", - "matchCriteriaId": "3ADAE75E-AB90-4193-AF4D-272810BF586B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:early_impact:productcart:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A19732B3-7734-40BF-8D25-0C3D0E0D60B3" + "criteria": "cpe:2.3:a:netsourcecommerce:productcart:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.53", + "matchCriteriaId": "1464CA9B-AA47-414A-8DD0-6D95E1A2819B" } ] } @@ -151,6 +94,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2004-02/0503.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -159,21 +103,46 @@ "url": "http://archives.neohapsis.com/archives/fulldisclosure/2004-02/0871.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/10898", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securitytracker.com/alerts/2004/Feb/1009085.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.earlyimpact.com/productcart/support/updates/ReadMe_ProductCart_Security_Patch_013004.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/3979", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.s-quadra.com/advisories/Adv-20040216.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -182,6 +151,9 @@ "url": "http://www.securityfocus.com/archive/1/354288", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -189,12 +161,19 @@ "url": "http://www.securityfocus.com/bid/9669", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15231", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-23xx/CVE-2004-2362.json b/CVE-2004/CVE-2004-23xx/CVE-2004-2362.json index a9d5eb85aec..50464dc4447 100644 --- a/CVE-2004/CVE-2004-23xx/CVE-2004-2362.json +++ b/CVE-2004/CVE-2004-23xx/CVE-2004-2362.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2362", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:49.903", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -202,15 +202,24 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11554", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1010061", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/5906", + "source": "cve@mitre.org" + }, { "url": "http://www.phpx.org/project.php?action=view&project_id=1", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-23xx/CVE-2004-2363.json b/CVE-2004/CVE-2004-23xx/CVE-2004-2363.json index 82db8e1b150..4a2e69e3d75 100644 --- a/CVE-2004/CVE-2004-23xx/CVE-2004-2363.json +++ b/CVE-2004/CVE-2004-23xx/CVE-2004-2363.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2363", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:49.950", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -166,7 +166,8 @@ "url": "http://www.phpx.org/project.php?action=view&project_id=1", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-23xx/CVE-2004-2364.json b/CVE-2004/CVE-2004-23xx/CVE-2004-2364.json index e32c6288019..9271d486bbc 100644 --- a/CVE-2004/CVE-2004-23xx/CVE-2004-2364.json +++ b/CVE-2004/CVE-2004-23xx/CVE-2004-2364.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2364", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:43:55.720", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -162,15 +162,40 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11554", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1010061", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/5907", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/5908", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/5909", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/5910", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/5911", + "source": "cve@mitre.org" + }, { "url": "http://www.phpx.org/project.php?action=view&project_id=1", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-23xx/CVE-2004-2368.json b/CVE-2004/CVE-2004-23xx/CVE-2004-2368.json index c76e07b4ffd..7b91caacd0b 100644 --- a/CVE-2004/CVE-2004-23xx/CVE-2004-2368.json +++ b/CVE-2004/CVE-2004-23xx/CVE-2004-2368.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2368", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:50.170", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,7 +71,8 @@ "url": "http://www.opt-x.org/index.php", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-24xx/CVE-2004-2418.json b/CVE-2004/CVE-2004-24xx/CVE-2004-2418.json index a39e7fcb9ee..8d5b3948f69 100644 --- a/CVE-2004/CVE-2004-24xx/CVE-2004-2418.json +++ b/CVE-2004/CVE-2004-24xx/CVE-2004-2418.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2418", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:52.640", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,14 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/13161", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1012167", "source": "cve@mitre.org", @@ -82,6 +90,13 @@ "Patch" ] }, + { + "url": "http://www.osvdb.org/11604", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.securityfocus.com/bid/11645", "source": "cve@mitre.org", @@ -93,7 +108,8 @@ "url": "http://www.whitsoftdev.com/slimftpd/", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2004/CVE-2004-24xx/CVE-2004-2487.json b/CVE-2004/CVE-2004-24xx/CVE-2004-2487.json index 87363b179ff..26689c5e196 100644 --- a/CVE-2004/CVE-2004-24xx/CVE-2004-2487.json +++ b/CVE-2004/CVE-2004-24xx/CVE-2004-2487.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2487", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:56.560", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,9 +82,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11216", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.nexgenserver.com/cgi-bin/loadframe2.cgi?/History.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/4557", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "http://www.securityfocus.com/bid/9970", diff --git a/CVE-2004/CVE-2004-24xx/CVE-2004-2488.json b/CVE-2004/CVE-2004-24xx/CVE-2004-2488.json index fb5d7faed9e..c12585fe2f6 100644 --- a/CVE-2004/CVE-2004-24xx/CVE-2004-2488.json +++ b/CVE-2004/CVE-2004-24xx/CVE-2004-2488.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2488", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:56.623", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,9 +82,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11216", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.nexgenserver.com/cgi-bin/loadframe2.cgi?/History.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/4557", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "http://www.securityfocus.com/bid/9970", diff --git a/CVE-2004/CVE-2004-25xx/CVE-2004-2562.json b/CVE-2004/CVE-2004-25xx/CVE-2004-2562.json index 6da11508537..7ea1d85a40d 100644 --- a/CVE-2004/CVE-2004-25xx/CVE-2004-2562.json +++ b/CVE-2004/CVE-2004-25xx/CVE-2004-2562.json @@ -2,7 +2,7 @@ "id": "CVE-2004-2562", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:32:00.827", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -242,8 +242,23 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/12123", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.lbehelpdesk.com/patch/web/history.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/8181", "source": "cve@mitre.org" }, { diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0006.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0006.json index ebaa3373708..4c5b881e658 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0006.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0006.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0006", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:47.810", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,6 +77,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/13946/", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-106.shtml", "source": "cve@mitre.org", @@ -88,7 +96,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0007.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0007.json index 685ce86619e..4f86cbf09a7 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0007.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0007.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0007", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:47.887", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,13 +77,23 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/13946/", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-106.shtml", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml", diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0008.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0008.json index 1059f46135f..2703d388cc4 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0008.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0008.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0008", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:47.967", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/13946/", + "source": "cve@mitre.org" + }, { "url": "http://www.ciac.org/ciac/bulletins/p-106.shtml", "source": "cve@mitre.org" @@ -90,7 +94,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0009.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0009.json index 035cb069841..b50d98267b5 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0009.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0009.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0009", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:48.310", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,6 +77,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/13946/", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-106.shtml", "source": "cve@mitre.org", @@ -86,7 +94,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml", diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0010.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0010.json index 598edce5f18..14e0a3d1d0f 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0010.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0010.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0010", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:48.403", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -87,13 +87,23 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/13946/", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-106.shtml", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml", diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0084.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0084.json index e7e740a1cb5..a5f42c87269 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0084.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0084.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0084", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:50.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -252,6 +252,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/13946/", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ciac.org/ciac/bulletins/p-106.shtml", "source": "cve@mitre.org" @@ -265,7 +272,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00017.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml", diff --git a/CVE-2005/CVE-2005-03xx/CVE-2005-0323.json b/CVE-2005/CVE-2005-03xx/CVE-2005-0323.json index 7b0e55ef2d7..9c382698ff8 100644 --- a/CVE-2005/CVE-2005-03xx/CVE-2005-0323.json +++ b/CVE-2005/CVE-2005-03xx/CVE-2005-0323.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0323", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:13.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,13 +71,20 @@ "url": "http://marc.info/?l=bugtraq&m=110703630922262&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/14075", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1013044", "source": "cve@mitre.org" }, { "url": "http://www.lovebug.org/imd_advisory.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/12399", diff --git a/CVE-2005/CVE-2005-03xx/CVE-2005-0324.json b/CVE-2005/CVE-2005-03xx/CVE-2005-0324.json index 06837d674a4..94b984f5ab1 100644 --- a/CVE-2005/CVE-2005-03xx/CVE-2005-0324.json +++ b/CVE-2005/CVE-2005-03xx/CVE-2005-0324.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0324", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:13.843", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,13 +71,20 @@ "url": "http://marc.info/?l=bugtraq&m=110703630922262&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/14075", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1013044", "source": "cve@mitre.org" }, { "url": "http://www.lovebug.org/imd_advisory.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/12399", diff --git a/CVE-2005/CVE-2005-04xx/CVE-2005-0486.json b/CVE-2005/CVE-2005-04xx/CVE-2005-0486.json index f0a63305a31..85f6883af08 100644 --- a/CVE-2005/CVE-2005-04xx/CVE-2005-0486.json +++ b/CVE-2005/CVE-2005-04xx/CVE-2005-0486.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0486", "sourceIdentifier": "cve@mitre.org", "published": "2005-03-30T05:00:00.000", - "lastModified": "2017-07-11T01:32:19.327", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -91,7 +91,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-05xx/CVE-2005-0572.json b/CVE-2005/CVE-2005-05xx/CVE-2005-0572.json index 023d4c5786e..9f89a14a50f 100644 --- a/CVE-2005/CVE-2005-05xx/CVE-2005-0572.json +++ b/CVE-2005/CVE-2005-05xx/CVE-2005-0572.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0572", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:21.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -120,7 +120,8 @@ "url": "http://neossecurity.net/Advisories/Advisory-05.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-06xx/CVE-2005-0603.json b/CVE-2005/CVE-2005-06xx/CVE-2005-0603.json index 287d0492165..93ebd3167c7 100644 --- a/CVE-2005/CVE-2005-06xx/CVE-2005-0603.json +++ b/CVE-2005/CVE-2005-06xx/CVE-2005-0603.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0603", "sourceIdentifier": "cve@mitre.org", "published": "2005-02-28T05:00:00.000", - "lastModified": "2016-10-18T03:13:00.080", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,21 @@ "url": "http://marc.info/?l=bugtraq&m=110943646112950&w=2", "source": "cve@mitre.org" }, + { + "url": "http://neossecurity.net/Advisories/Advisory-06.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/14413", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.phpbb.com/phpBB/viewtopic.php?t=267563", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-06xx/CVE-2005-0699.json b/CVE-2005/CVE-2005-06xx/CVE-2005-0699.json index f5ffee2c3c4..869268a1cf6 100644 --- a/CVE-2005/CVE-2005-06xx/CVE-2005-0699.json +++ b/CVE-2005/CVE-2005-06xx/CVE-2005-0699.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0699", "sourceIdentifier": "cve@mitre.org", "published": "2005-03-08T05:00:00.000", - "lastModified": "2017-10-11T01:29:59.327", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -233,7 +233,8 @@ "tags": [ "Exploit", "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-07xx/CVE-2005-0704.json b/CVE-2005/CVE-2005-07xx/CVE-2005-0704.json index 35fa4ae90ab..5fc947af516 100644 --- a/CVE-2005/CVE-2005-07xx/CVE-2005-0704.json +++ b/CVE-2005/CVE-2005-07xx/CVE-2005-0704.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0704", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:59.387", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,7 +81,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-07xx/CVE-2005-0705.json b/CVE-2005/CVE-2005-07xx/CVE-2005-0705.json index e5681364745..556b4d34c5d 100644 --- a/CVE-2005/CVE-2005-07xx/CVE-2005-0705.json +++ b/CVE-2005/CVE-2005-07xx/CVE-2005-0705.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0705", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:59.450", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,7 +81,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-07xx/CVE-2005-0739.json b/CVE-2005/CVE-2005-07xx/CVE-2005-0739.json index 8bcadf8c8ca..a218c9caeec 100644 --- a/CVE-2005/CVE-2005-07xx/CVE-2005-0739.json +++ b/CVE-2005/CVE-2005-07xx/CVE-2005-0739.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0739", "sourceIdentifier": "security@debian.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:59.983", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -70,7 +70,10 @@ "references": [ { "url": "http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707", - "source": "security@debian.org" + "source": "security@debian.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=111066805726551&w=2", @@ -91,7 +94,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html", "source": "security@debian.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-07xx/CVE-2005-0765.json b/CVE-2005/CVE-2005-07xx/CVE-2005-0765.json index 4afdc90f19f..b5dad362410 100644 --- a/CVE-2005/CVE-2005-07xx/CVE-2005-0765.json +++ b/CVE-2005/CVE-2005-07xx/CVE-2005-0765.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0765", "sourceIdentifier": "cve@mitre.org", "published": "2005-03-12T05:00:00.000", - "lastModified": "2017-10-11T01:30:00.967", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,7 +71,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-07xx/CVE-2005-0766.json b/CVE-2005/CVE-2005-07xx/CVE-2005-0766.json index 1cf021932f9..0de8293b83a 100644 --- a/CVE-2005/CVE-2005-07xx/CVE-2005-0766.json +++ b/CVE-2005/CVE-2005-07xx/CVE-2005-0766.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0766", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:30:01.047", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,7 +72,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00018.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-08xx/CVE-2005-0827.json b/CVE-2005/CVE-2005-08xx/CVE-2005-0827.json index 63f21427686..07a6743b50e 100644 --- a/CVE-2005/CVE-2005-08xx/CVE-2005-0827.json +++ b/CVE-2005/CVE-2005-08xx/CVE-2005-0827.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0827", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:25.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,11 +85,19 @@ "url": "http://marc.info/?l=bugtraq&m=111125588920928&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/14641", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.ihsteam.com/download/sections/runcms%20advisory%20-%20eng.pdf", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-08xx/CVE-2005-0828.json b/CVE-2005/CVE-2005-08xx/CVE-2005-0828.json index 3ab9a37551e..d4268e5e920 100644 --- a/CVE-2005/CVE-2005-08xx/CVE-2005-0828.json +++ b/CVE-2005/CVE-2005-08xx/CVE-2005-0828.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0828", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:25.843", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,6 +85,21 @@ "url": "http://marc.info/?l=bugtraq&m=111125645312693&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/14641", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/14648", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1013485", "source": "cve@mitre.org" @@ -93,16 +108,22 @@ "url": "http://www.ihsteam.com/download/advisory/Exoops%20highlight%20hole.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://www.ihsteam.com/download/sections/runcms%20advisory%20-%20eng.pdf", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/14890", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/12848", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-08xx/CVE-2005-0832.json b/CVE-2005/CVE-2005-08xx/CVE-2005-0832.json index ba721efb693..e4147e1eca8 100644 --- a/CVE-2005/CVE-2005-08xx/CVE-2005-0832.json +++ b/CVE-2005/CVE-2005-08xx/CVE-2005-0832.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0832", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2008-09-05T20:47:27.237", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -94,7 +94,10 @@ "references": [ { "url": "http://www.php-post.co.uk/index.php?s=content&p=download", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/12845", diff --git a/CVE-2005/CVE-2005-09xx/CVE-2005-0958.json b/CVE-2005/CVE-2005-09xx/CVE-2005-0958.json index d7a63cf04de..829918d0c30 100644 --- a/CVE-2005/CVE-2005-09xx/CVE-2005-0958.json +++ b/CVE-2005/CVE-2005-09xx/CVE-2005-0958.json @@ -2,7 +2,7 @@ "id": "CVE-2005-0958", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2008-09-05T20:47:47.817", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -81,7 +81,8 @@ "url": "http://unl0ck.org/files/papers/mtftpd.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-10xx/CVE-2005-1047.json b/CVE-2005/CVE-2005-10xx/CVE-2005-1047.json index 09216f261fd..d29418bce6e 100644 --- a/CVE-2005/CVE-2005-10xx/CVE-2005-1047.json +++ b/CVE-2005/CVE-2005-10xx/CVE-2005-1047.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1047", "sourceIdentifier": "cve@mitre.org", "published": "2005-04-07T04:00:00.000", - "lastModified": "2016-10-18T03:16:51.197", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -192,6 +192,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.defacers.com.mx/advisories/2.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-11xx/CVE-2005-1161.json b/CVE-2005/CVE-2005-11xx/CVE-2005-1161.json index d76d37cf5e0..1f90f05c62b 100644 --- a/CVE-2005/CVE-2005-11xx/CVE-2005-1161.json +++ b/CVE-2005/CVE-2005-11xx/CVE-2005-1161.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1161", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:33.640", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ "url": "http://marc.info/?l=bugtraq&m=111352017704126&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/14969", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://securitytracker.com/id?1013720", "source": "cve@mitre.org", @@ -80,6 +87,21 @@ }, { "url": "http://www.oneworldstore.com/support_security_issue_updates.asp#April_15_2005_DCrab", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/15518", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/15519", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/15520", "source": "cve@mitre.org" }, { diff --git a/CVE-2005/CVE-2005-11xx/CVE-2005-1162.json b/CVE-2005/CVE-2005-11xx/CVE-2005-1162.json index 3ea19e89b3f..c74f8ae7b1f 100644 --- a/CVE-2005/CVE-2005-11xx/CVE-2005-1162.json +++ b/CVE-2005/CVE-2005-11xx/CVE-2005-1162.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1162", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:33.703", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,14 @@ "url": "http://marc.info/?l=bugtraq&m=111352017704126&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/14969", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1013720", "source": "cve@mitre.org", @@ -83,7 +91,29 @@ "url": "http://www.oneworldstore.com/support_security_issue_updates.asp#April_15_2005_DCrab", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/15521", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/15522", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/15523", + "source": "cve@mitre.org", + "tags": [ + "Exploit" ] }, { diff --git a/CVE-2005/CVE-2005-11xx/CVE-2005-1187.json b/CVE-2005/CVE-2005-11xx/CVE-2005-1187.json index 222454cbac7..a06ddce7892 100644 --- a/CVE-2005/CVE-2005-11xx/CVE-2005-1187.json +++ b/CVE-2005/CVE-2005-11xx/CVE-2005-1187.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1187", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:34.720", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.unl0ck.org/files/papers/winhex.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20139", diff --git a/CVE-2005/CVE-2005-12xx/CVE-2005-1221.json b/CVE-2005/CVE-2005-12xx/CVE-2005-1221.json index 398e89786c5..d03762e508a 100644 --- a/CVE-2005/CVE-2005-12xx/CVE-2005-1221.json +++ b/CVE-2005/CVE-2005-12xx/CVE-2005-1221.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1221", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:35.280", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://www.ihssecurity.com/download/advisory/ecomerce-cart.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-13xx/CVE-2005-1328.json b/CVE-2005/CVE-2005-13xx/CVE-2005-1328.json index a96c293fd86..93337785710 100644 --- a/CVE-2005/CVE-2005-13xx/CVE-2005-1328.json +++ b/CVE-2005/CVE-2005-13xx/CVE-2005-1328.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1328", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2008-09-05T20:48:51.327", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -95,6 +95,10 @@ "Patch" ] }, + { + "url": "http://secunia.com/advisories/15057", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1013782", "source": "cve@mitre.org", @@ -107,9 +111,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch" + "Patch", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/15724", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/13322", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-13xx/CVE-2005-1329.json b/CVE-2005/CVE-2005-13xx/CVE-2005-1329.json index 5411e265cb8..cd91a280100 100644 --- a/CVE-2005/CVE-2005-13xx/CVE-2005-1329.json +++ b/CVE-2005/CVE-2005-13xx/CVE-2005-1329.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1329", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2008-09-05T20:48:51.500", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -95,6 +95,13 @@ "Patch" ] }, + { + "url": "http://secunia.com/advisories/15104", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://securitytracker.com/id?1013796", "source": "cve@mitre.org", @@ -107,7 +114,15 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/15781", + "source": "cve@mitre.org", + "tags": [ + "Exploit" ] }, { diff --git a/CVE-2005/CVE-2005-13xx/CVE-2005-1347.json b/CVE-2005/CVE-2005-13xx/CVE-2005-1347.json index efd7fb43604..54149bebdce 100644 --- a/CVE-2005/CVE-2005-13xx/CVE-2005-1347.json +++ b/CVE-2005/CVE-2005-13xx/CVE-2005-1347.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1347", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:37.077", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,6 +83,17 @@ }, { "url": "http://www.alphahackers.com/advisories/acrobat6.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/15850", + "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/13265", "source": "cve@mitre.org" }, { diff --git a/CVE-2005/CVE-2005-13xx/CVE-2005-1348.json b/CVE-2005/CVE-2005-13xx/CVE-2005-1348.json index fc3acb91f88..fe3e15d68f0 100644 --- a/CVE-2005/CVE-2005-13xx/CVE-2005-1348.json +++ b/CVE-2005/CVE-2005-13xx/CVE-2005-1348.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1348", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2016-10-18T03:18:59.860", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,8 +83,15 @@ "source": "cve@mitre.org" }, { - "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl", + "url": "http://www.osvdb.org/15737", "source": "cve@mitre.org" + }, + { + "url": "http://www.x0n3-h4ck.org/upload/x0n3-h4ck_mailenable_https.pl", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1456.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1456.json index a376a179ff2..5a9704ce892 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1456.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1456.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1456", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.547", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -240,12 +240,16 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00019.html", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.ethereal.com/news/item_20050504_01.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1457.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1457.json index 471b1f889a8..4c6b5991d76 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1457.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1457.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1457", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.623", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,14 +241,16 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.ethereal.com/news/item_20050504_01.html", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1458.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1458.json index 61f801d0b97..1cc1f77c03b 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1458.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1458.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1458", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.687", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1459.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1459.json index 1fca2221cba..3d9fa365ad3 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1459.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1459.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1459", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.763", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1460.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1460.json index 5a73ee2f252..c051c57d369 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1460.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1460.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1460", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.827", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1461.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1461.json index 3d659363891..15f189f0cbd 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1461.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1461.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1461", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.890", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -243,11 +243,17 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00019.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.ethereal.com/news/item_20050504_01.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1462.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1462.json index 22faf0a242f..60ff231a927 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1462.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1462.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1462", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:07.967", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1463.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1463.json index b56307a71aa..59d2cf875af 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1463.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1463.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1463", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.030", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Vendor Advisory", - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1464.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1464.json index 89aec0531ef..142162932c7 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1464.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1464.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1464", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.123", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -243,11 +243,17 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00019.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.ethereal.com/news/item_20050504_01.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1465.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1465.json index 3b4c5093e0f..5f90ba66d47 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1465.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1465.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1465", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1466.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1466.json index 7d76a1b3670..c9a69574781 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1466.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1466.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1466", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.357", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1467.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1467.json index dfbbf00a2af..da7b3a5137c 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1467.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1467.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1467", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.467", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -243,11 +243,17 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00019.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.ethereal.com/news/item_20050504_01.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1468.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1468.json index 3d9e25df285..10765cd3b18 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1468.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1468.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1468", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.560", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1469.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1469.json index 495aa2ff619..32e580c6f62 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1469.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1469.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1469", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.623", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-14xx/CVE-2005-1470.json b/CVE-2005/CVE-2005-14xx/CVE-2005-1470.json index 051ea476b5d..32541134f85 100644 --- a/CVE-2005/CVE-2005-14xx/CVE-2005-1470.json +++ b/CVE-2005/CVE-2005-14xx/CVE-2005-1470.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1470", "sourceIdentifier": "secalert@redhat.com", "published": "2005-05-05T04:00:00.000", - "lastModified": "2017-10-11T01:30:08.687", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -241,7 +241,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -249,7 +250,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-15xx/CVE-2005-1527.json b/CVE-2005/CVE-2005-15xx/CVE-2005-1527.json index 7dbc08e0e22..b432981d222 100644 --- a/CVE-2005/CVE-2005-15xx/CVE-2005-1527.json +++ b/CVE-2005/CVE-2005-15xx/CVE-2005-1527.json @@ -2,8 +2,8 @@ "id": "CVE-2005-1527", "sourceIdentifier": "cve@mitre.org", "published": "2005-08-15T04:00:00.000", - "lastModified": "2018-10-03T21:30:13.937", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:58:23.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,73 +58,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*", - "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B" + "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4", + "matchCriteriaId": "72B26DE8-DB65-4D9D-8C74-4BCDB83B0A76" } ] } @@ -138,18 +74,28 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", - "matchCriteriaId": "3BD12488-1ED8-4751-ABF5-3578D54750A8" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", + "matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", - "matchCriteriaId": "AE3733CF-4C88-443C-9B90-6477C9C500D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", - "matchCriteriaId": "9C500A75-D75E-45B4-B582-0F0DF27C3C04" + "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" } ] } @@ -157,43 +103,93 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16412", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/17463", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securitytracker.com/id?1014636", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.debian.org/security/2005/dsa-892", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/18696", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch" + ] }, { "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/14525", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://usn.ubuntu.com/167-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-15xx/CVE-2005-1573.json b/CVE-2005/CVE-2005-15xx/CVE-2005-1573.json index f7055fbacda..efa34833e74 100644 --- a/CVE-2005/CVE-2005-15xx/CVE-2005-1573.json +++ b/CVE-2005/CVE-2005-15xx/CVE-2005-1573.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1573", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-11T04:00:00.000", - "lastModified": "2008-09-05T20:49:30.527", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -80,7 +80,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-15xx/CVE-2005-1596.json b/CVE-2005/CVE-2005-15xx/CVE-2005-1596.json index 5c91eb78dc4..41dbc95199c 100644 --- a/CVE-2005/CVE-2005-15xx/CVE-2005-1596.json +++ b/CVE-2005/CVE-2005-15xx/CVE-2005-1596.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1596", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-16T04:00:00.000", - "lastModified": "2017-07-11T01:32:42.343", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -68,11 +68,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15257", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.exploits.co.in/Article1134.html", "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/16216", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/16217", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1628.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1628.json index b2de551211a..e48b61fddc8 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1628.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1628.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1628", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-17T04:00:00.000", - "lastModified": "2018-10-19T15:31:50.567", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,7 +79,10 @@ "references": [ { "url": "http://www.defacers.com.mx/advisories/3.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/449517/100/200/threaded", diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1639.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1639.json index 42be1ab772f..4923e521458 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1639.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1639.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1639", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-17T04:00:00.000", - "lastModified": "2008-09-05T20:49:40.637", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -68,12 +68,21 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15379", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/16620", + "source": "cve@mitre.org" + }, { "url": "http://www.under9round.com/sigma.txt", "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1650.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1650.json index a1eefade76f..06e35b6e57d 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1650.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1650.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1650", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-18T04:00:00.000", - "lastModified": "2008-09-05T20:49:42.513", + "lastModified": "2024-02-14T14:43:45.090", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,18 +17,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", - "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 }, - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, - "impactScore": 6.4, + "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-203" } ] } @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:woppoware:postmaster:4.2.2_build3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "131C5E2A-4F44-4D74-A502-59BDF0B9B070" + "criteria": "cpe:2.3:a:woppoware:postmaster:4.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C19B5FBE-B99E-4B83-B45D-EFD89DEB214C" } ] } @@ -67,9 +67,21 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15268", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/bid/13597", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1692.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1692.json index bcff4b66a48..919b26b2dfa 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1692.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1692.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1692", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-24T04:00:00.000", - "lastModified": "2016-10-18T03:21:48.090", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -90,12 +90,23 @@ "url": "http://marc.info/?l=bugtraq&m=111670637812128&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/15451", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200505-19.xml", "source": "cve@mitre.org" }, { "url": "http://www.0xbadexworm.org/adv/gxinefmt.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/16747", "source": "cve@mitre.org" }, { diff --git a/CVE-2005/CVE-2005-17xx/CVE-2005-1750.json b/CVE-2005/CVE-2005-17xx/CVE-2005-1750.json index fa6b4f9bff3..60974e7d800 100644 --- a/CVE-2005/CVE-2005-17xx/CVE-2005-1750.json +++ b/CVE-2005/CVE-2005-17xx/CVE-2005-1750.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1750", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-25T04:00:00.000", - "lastModified": "2008-09-05T20:49:59.840", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,6 +67,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15469", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1014038", "source": "cve@mitre.org" @@ -80,7 +84,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-17xx/CVE-2005-1780.json b/CVE-2005/CVE-2005-17xx/CVE-2005-1780.json index 7d4f9ccc538..b8ccd35fd55 100644 --- a/CVE-2005/CVE-2005-17xx/CVE-2005-1780.json +++ b/CVE-2005/CVE-2005-17xx/CVE-2005-1780.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1780", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-31T04:00:00.000", - "lastModified": "2008-09-05T20:50:04.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,6 +67,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15493", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1014057", "source": "cve@mitre.org" @@ -76,7 +83,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-17xx/CVE-2005-1785.json b/CVE-2005/CVE-2005-17xx/CVE-2005-1785.json index 017504350c4..277bc0637e1 100644 --- a/CVE-2005/CVE-2005-17xx/CVE-2005-1785.json +++ b/CVE-2005/CVE-2005-17xx/CVE-2005-1785.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1785", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-31T04:00:00.000", - "lastModified": "2011-03-08T02:22:49.643", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,6 +67,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15515", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1014063", "source": "cve@mitre.org", @@ -87,7 +91,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-17xx/CVE-2005-1786.json b/CVE-2005/CVE-2005-17xx/CVE-2005-1786.json index 54352caeaff..5d31a1b820c 100644 --- a/CVE-2005/CVE-2005-17xx/CVE-2005-1786.json +++ b/CVE-2005/CVE-2005-17xx/CVE-2005-1786.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1786", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-25T04:00:00.000", - "lastModified": "2008-09-05T20:50:05.917", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,6 +67,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15494", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1014056", "source": "cve@mitre.org" @@ -76,7 +83,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -84,7 +92,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-18xx/CVE-2005-1805.json b/CVE-2005/CVE-2005-18xx/CVE-2005-1805.json index 9cc2dba72b3..38a46728c1e 100644 --- a/CVE-2005/CVE-2005-18xx/CVE-2005-1805.json +++ b/CVE-2005/CVE-2005-18xx/CVE-2005-1805.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1805", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-28T04:00:00.000", - "lastModified": "2011-03-08T02:22:54.563", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,7 +85,8 @@ "url": "http://www.under9round.com/os4e.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-18xx/CVE-2005-1865.json b/CVE-2005/CVE-2005-18xx/CVE-2005-1865.json index df6099fb184..54497a26863 100644 --- a/CVE-2005/CVE-2005-18xx/CVE-2005-1865.json +++ b/CVE-2005/CVE-2005-18xx/CVE-2005-1865.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1865", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-09T04:00:00.000", - "lastModified": "2008-09-05T20:50:17.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -74,6 +74,10 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/15569", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/alerts/2005/May/1014083.html", "source": "cve@mitre.org", @@ -83,10 +87,32 @@ }, { "url": "http://www.calendarix.com/download_advanced.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.calendarix.com/download_basic.php", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/16971", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/16972", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/16974", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/16975", "source": "cve@mitre.org" } ] diff --git a/CVE-2005/CVE-2005-18xx/CVE-2005-1869.json b/CVE-2005/CVE-2005-18xx/CVE-2005-1869.json index bf77b0de9e6..d75360d5d82 100644 --- a/CVE-2005/CVE-2005-18xx/CVE-2005-1869.json +++ b/CVE-2005/CVE-2005-18xx/CVE-2005-1869.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1869", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-07T04:00:00.000", - "lastModified": "2008-09-05T20:50:17.933", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -68,6 +68,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15596", + "source": "cve@mitre.org" + }, { "url": "http://www.appindex.net", "source": "cve@mitre.org", @@ -81,6 +85,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/17087", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, diff --git a/CVE-2005/CVE-2005-19xx/CVE-2005-1904.json b/CVE-2005/CVE-2005-19xx/CVE-2005-1904.json index f9709a4c114..7839db91a52 100644 --- a/CVE-2005/CVE-2005-19xx/CVE-2005-1904.json +++ b/CVE-2005/CVE-2005-19xx/CVE-2005-1904.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1904", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-09T04:00:00.000", - "lastModified": "2008-09-05T20:50:23.477", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,15 +67,24 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15564", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1014086", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/16969", + "source": "cve@mitre.org" + }, { "url": "http://www.under9round.com/jus.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-19xx/CVE-2005-1906.json b/CVE-2005/CVE-2005-19xx/CVE-2005-1906.json index 6f5eed32238..13d81588c11 100644 --- a/CVE-2005/CVE-2005-19xx/CVE-2005-1906.json +++ b/CVE-2005/CVE-2005-19xx/CVE-2005-1906.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1906", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-02T04:00:00.000", - "lastModified": "2011-03-08T02:23:04.313", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,13 @@ "Vendor Advisory" ] }, + { + "url": "http://www.under9round.com/lmg.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.vupen.com/english/advisories/2005/0678", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-19xx/CVE-2005-1910.json b/CVE-2005/CVE-2005-19xx/CVE-2005-1910.json index 4aa321ae94c..da8e8fb5faa 100644 --- a/CVE-2005/CVE-2005-19xx/CVE-2005-1910.json +++ b/CVE-2005/CVE-2005-19xx/CVE-2005-1910.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1910", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-05T04:00:00.000", - "lastModified": "2008-09-05T20:50:24.417", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,6 +67,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/15595", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1014104", "source": "cve@mitre.org", @@ -79,7 +83,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-19xx/CVE-2005-1921.json b/CVE-2005/CVE-2005-19xx/CVE-2005-1921.json index 94f3dcae0cd..2e3f276334a 100644 --- a/CVE-2005/CVE-2005-19xx/CVE-2005-1921.json +++ b/CVE-2005/CVE-2005-19xx/CVE-2005-1921.json @@ -2,8 +2,8 @@ "id": "CVE-2005-1921", "sourceIdentifier": "secalert@redhat.com", "published": "2005-07-05T04:00:00.000", - "lastModified": "2018-10-19T15:32:03.347", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:41:53.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,88 +58,79 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5241665D-61C1-4ECB-A449-43568150CB73" + "criteria": "cpe:2.3:a:php:xml_rpc:*:*:*:*:*:pear:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "DF9FF982-2BF4-49ED-82F8-C8F8327D2EF3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "83956BC5-8694-4C4B-92C4-D3C960980F66" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.5.4", + "matchCriteriaId": "00201099-3C07-44F0-880B-CE2AE77EE171" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1D4E772E-76B5-48E3-81EF-B5F3B2B60669" - }, + "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.6.0", + "versionEndExcluding": "4.6.2", + "matchCriteriaId": "3C248ACE-86AF-40FF-8B8F-FE1879E54FF2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D66E0B84-DE95-4306-9CA7-006D168C188B" - }, + "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.5", + "matchCriteriaId": "363E6E27-87B4-4271-B374-B176DE9E5D56" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8C295FC3-469D-48FB-820D-7DAA75D3A9F6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EDF2A7C7-3FC8-4581-B4CB-D80BE1A6D6D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "69A0E9AE-74F4-4CC8-B137-CECA8F11224F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc2:*:*:*:*:*:*:*", - "matchCriteriaId": "9FF6E378-4388-43F7-AF85-47855A7F96F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc3:*:*:*:*:*:*:*", - "matchCriteriaId": "D2590C68-88A0-4921-BB36-129752145BC7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc4:*:*:*:*:*:*:*", - "matchCriteriaId": "97ABEE68-A1A3-4CE3-A117-84275B445675" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc5:*:*:*:*:*:*:*", - "matchCriteriaId": "6E535400-D140-4780-98CB-133142CD390E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc6:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D8566F-8165-4BE5-BA18-7D73FBED62B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.0rc7:*:*:*:*:*:*:*", - "matchCriteriaId": "1C188D7B-377F-4B08-8351-306CD4FB2530" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "06A8377B-CDD9-49C9-B263-FB7FE1228E65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "370F9F15-10D2-4C67-898E-F95222305599" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.3.0rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "4D09F8C0-0A05-48CA-AF29-510E100B743A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.3.0rc2:*:*:*:*:*:*:*", - "matchCriteriaId": "206298B4-ECFE-40F1-9095-4E9BB5865217" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pear:xml_rpc:1.3.0rc3:*:*:*:*:*:*:*", - "matchCriteriaId": "8CAA1638-A8AC-4589-91F1-F990D3140CCA" + "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" } ] } @@ -149,76 +140,282 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=112008638320145&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112015336720867&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://pear.php.net/package/XML_RPC/download/1.3.1", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "Product" + ] + }, + { + "url": "http://secunia.com/advisories/15810", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15852", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15855", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15861", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15872", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15883", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15884", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15895", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15903", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15904", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15916", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15917", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15922", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15944", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15947", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/15957", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16001", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16339", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16693", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/17440", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/17674", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/18003", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" ] }, { "url": "http://security.gentoo.org/glsa/glsa-200507-01.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200507-06.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200507-07.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1015336", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://sourceforge.net/project/showfiles.php?group_id=87163", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Product" + ] }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=338803", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.ampache.org/announce/3_3_1_2.php", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2005/dsa-745", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2005/dsa-746", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2005/dsa-747", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2005/dsa-789", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.gulftech.org/?node=research&article_id=00087-07012005", "source": "secalert@redhat.com", "tags": [ - "Patch", + "Not Applicable", "Vendor Advisory" ] }, @@ -226,7 +423,7 @@ "url": "http://www.hardened-php.net/advisory-022005.php", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Not Applicable" ] }, { @@ -234,44 +431,76 @@ "source": "secalert@redhat.com", "tags": [ "Patch", + "Third Party Advisory", "Vendor Advisory" ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_41_php_pear.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_49_php.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-564.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/419064/100/0/threaded", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/14088", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2005/2827", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-19xx/CVE-2005-1949.json b/CVE-2005/CVE-2005-19xx/CVE-2005-1949.json index 7fa985ca933..68bbec20436 100644 --- a/CVE-2005/CVE-2005-19xx/CVE-2005-1949.json +++ b/CVE-2005/CVE-2005-19xx/CVE-2005-1949.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1949", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-16T04:00:00.000", - "lastModified": "2016-10-18T03:23:29.403", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,10 @@ "references": [ { "url": "http://e107plugins.co.uk/news.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=111835539312985&w=2", @@ -78,6 +81,10 @@ { "url": "http://marc.info/?l=bugtraq&m=111868460811287&w=2", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/15678", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2074.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2074.json index 41efbdb737e..c806bd58d4e 100644 --- a/CVE-2005/CVE-2005-20xx/CVE-2005-2074.json +++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2074.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2074", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-29T04:00:00.000", - "lastModified": "2011-03-08T02:23:20.923", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,7 +71,16 @@ "url": "http://dark-assassins.com/forum/viewtopic.php?t=145", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/15830", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2075.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2075.json index e509e901bca..a27b0628f28 100644 --- a/CVE-2005/CVE-2005-20xx/CVE-2005-2075.json +++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2075.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2075", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-29T04:00:00.000", - "lastModified": "2011-03-08T02:23:21.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,7 +76,16 @@ "url": "http://dark-assassins.com/forum/viewtopic.php?t=142", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/15830", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2166.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2166.json index 2915f4c939a..b223185dbd5 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2166.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2166.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2166", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-06T04:00:00.000", - "lastModified": "2008-09-05T20:51:03.680", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -87,6 +87,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/15902", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] } diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2167.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2167.json index a1c75f23a49..d80af5af490 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2167.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2167.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2167", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-06T04:00:00.000", - "lastModified": "2008-09-05T20:51:03.837", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,6 +85,14 @@ { "url": "http://dark-assassins.com/forum/viewtopic.php?t=90", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/15902", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2168.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2168.json index 564b24fd331..32280a032af 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2168.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2168.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2168", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-06T04:00:00.000", - "lastModified": "2008-09-05T20:51:03.990", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,6 +85,14 @@ { "url": "http://dark-assassins.com/forum/viewtopic.php?t=90", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/15902", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] diff --git a/CVE-2005/CVE-2005-22xx/CVE-2005-2210.json b/CVE-2005/CVE-2005-22xx/CVE-2005-2210.json index 6c0ff3b4330..5d75872bcd4 100644 --- a/CVE-2005/CVE-2005-22xx/CVE-2005-2210.json +++ b/CVE-2005/CVE-2005-22xx/CVE-2005-2210.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2210", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-11T04:00:00.000", - "lastModified": "2008-09-05T20:51:10.350", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -78,7 +78,8 @@ "url": "http://www.ihsteam.com/download/ihsexpl/dlm.c", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-22xx/CVE-2005-2225.json b/CVE-2005/CVE-2005-22xx/CVE-2005-2225.json index 5a46a30db20..1d0f868d903 100644 --- a/CVE-2005/CVE-2005-22xx/CVE-2005-2225.json +++ b/CVE-2005/CVE-2005-22xx/CVE-2005-2225.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2225", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-12T04:00:00.000", - "lastModified": "2021-06-15T20:15:11.167", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -88,7 +88,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-22xx/CVE-2005-2281.json b/CVE-2005/CVE-2005-22xx/CVE-2005-2281.json index 86018a28ab0..2627a2f004e 100644 --- a/CVE-2005/CVE-2005-22xx/CVE-2005-2281.json +++ b/CVE-2005/CVE-2005-22xx/CVE-2005-2281.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2281", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-18T04:00:00.000", - "lastModified": "2008-09-05T20:51:22.023", + "lastModified": "2024-02-14T15:47:22.243", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-326" } ] } @@ -62,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:esi_products:webeoc:*:*:*:*:*:*:*:*", - "versionEndIncluding": "6.0.1", - "matchCriteriaId": "09DA3374-FE82-4EAD-97A7-506648D89D4E" + "criteria": "cpe:2.3:a:juvare:webeoc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.0.2", + "matchCriteriaId": "04EF9920-C343-43C7-8AE3-32A5813A9CB2" } ] } @@ -77,12 +99,17 @@ "source": "cve@mitre.org", "tags": [ "Patch", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.kb.cert.org/vuls/id/JGEI-6BWQDQ", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2321.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2321.json index 1fc7553021c..bd91f4a7ee9 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2321.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2321.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2321", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-19T04:00:00.000", - "lastModified": "2008-09-05T20:51:28.350", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,9 +72,24 @@ ], "references": [ { - "url": "http://www.calogic.de/modules/newbb/viewtopic.php?topic_id=333&forum=7", + "url": "http://secunia.com/advisories/16090", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.albaniafuckgreece.org/adviso/calogic.txt", "source": "cve@mitre.org" }, + { + "url": "http://www.calogic.de/modules/newbb/viewtopic.php?topic_id=333&forum=7", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/14296", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2360.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2360.json index 47e50ff4161..de23ea6d3bb 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2360.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2360.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2360", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:15.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -287,6 +287,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -295,7 +303,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2361.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2361.json index 0e220c460e9..981655f16b9 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2361.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2361.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2361", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:15.873", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -217,6 +217,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -225,7 +233,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2362.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2362.json index 6e7bb364a87..8b7545e93a3 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2362.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2362.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2362", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:15.950", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -207,11 +207,16 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225", + "source": "secalert@redhat.com" + }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2363.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2363.json index d3abd3daa45..065e9ae9131 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2363.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2363.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2363", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:16.013", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -237,6 +237,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -245,7 +253,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2364.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2364.json index 5e62e8ef94a..2c7c7b21ec0 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2364.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2364.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2364", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:16.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -212,6 +212,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -220,7 +228,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -234,6 +243,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/18386", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2365.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2365.json index edfd9005ee5..ada5e50917a 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2365.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2365.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2365", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:16.170", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -207,6 +207,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -215,7 +223,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2366.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2366.json index 6a30e3a9ea0..5098ee5a180 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2366.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2366.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2366", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:16.247", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,6 +67,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -75,7 +83,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2367.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2367.json index 72f7f504609..e6e0dddc17c 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2367.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2367.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2367", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-10T04:00:00.000", - "lastModified": "2017-10-11T01:30:16.327", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -187,6 +187,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16225/", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17102", + "source": "secalert@redhat.com" + }, { "url": "http://www.debian.org/security/2005/dsa-853", "source": "secalert@redhat.com" @@ -195,7 +203,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00020.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-23xx/CVE-2005-2373.json b/CVE-2005/CVE-2005-23xx/CVE-2005-2373.json index aedc9039d2a..64534006893 100644 --- a/CVE-2005/CVE-2005-23xx/CVE-2005-2373.json +++ b/CVE-2005/CVE-2005-23xx/CVE-2005-2373.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2373", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-26T04:00:00.000", - "lastModified": "2016-10-18T03:26:26.887", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,13 +80,20 @@ "url": "http://marc.info/?l=bugtraq&m=112196537312610&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/16177", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1014542", "source": "cve@mitre.org" }, { "url": "http://www.whitsoftdev.com/slimftpd/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-24xx/CVE-2005-2491.json b/CVE-2005/CVE-2005-24xx/CVE-2005-2491.json index feae4e7825d..0b94cbcd4b6 100644 --- a/CVE-2005/CVE-2005-24xx/CVE-2005-2491.json +++ b/CVE-2005/CVE-2005-24xx/CVE-2005-2491.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2491", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-23T04:00:00.000", - "lastModified": "2023-02-13T01:16:14.413", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -116,6 +116,46 @@ "url": "http://marc.info/?l=bugtraq&m=130497311408250&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/16502", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/16679", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17252", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17813", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19072", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19193", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19532", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21522", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22691", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22875", + "source": "secalert@redhat.com" + }, { "url": "http://securityreason.com/securityalert/604", "source": "secalert@redhat.com" @@ -165,7 +205,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml", diff --git a/CVE-2005/CVE-2005-24xx/CVE-2005-2498.json b/CVE-2005/CVE-2005-24xx/CVE-2005-2498.json index 5fa2d46b458..0d7faeda702 100644 --- a/CVE-2005/CVE-2005-24xx/CVE-2005-2498.json +++ b/CVE-2005/CVE-2005-24xx/CVE-2005-2498.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2498", "sourceIdentifier": "secalert@redhat.com", "published": "2005-08-15T04:00:00.000", - "lastModified": "2017-10-11T01:30:17.780", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:47:32.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,18 +17,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", - "confidentialityImpact": "NONE", + "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", + "baseSeverity": "HIGH", "exploitabilityScore": 10.0, - "impactScore": 2.9, + "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,8 +58,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:edd_dumbill:phpxmlrpc:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1DE8C49B-2CC6-4AD8-97EF-B7A9B5982D3C" + "criteria": "cpe:2.3:a:gggeek:phpxmlrpc:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.1.1", + "matchCriteriaId": "7AE79B9A-3181-4A0E-863A-646D231891DA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" } ] } @@ -69,67 +85,243 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=112412415822890&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112431497300344&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/16431", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16432", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16441", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16460", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16465", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16468", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16469", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16491", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16550", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16558", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16563", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16619", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16635", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16693", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/16976", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/17053", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/17066", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/17440", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2005/dsa-789", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2005/dsa-798", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2005/dsa-840", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.debian.org/security/2005/dsa-842", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.hardened-php.net/advisory_152005.67.html", "source": "secalert@redhat.com", "tags": [ + "Not Applicable", "Patch", "Vendor Advisory" ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_49_php.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-748.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/408125", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/14560", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-25xx/CVE-2005-2559.json b/CVE-2005/CVE-2005-25xx/CVE-2005-2559.json index fae170cd4c4..71341b789dc 100644 --- a/CVE-2005/CVE-2005-25xx/CVE-2005-2559.json +++ b/CVE-2005/CVE-2005-25xx/CVE-2005-2559.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2559", "sourceIdentifier": "cve@mitre.org", "published": "2005-08-16T04:00:00.000", - "lastModified": "2016-10-18T03:28:20.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,7 +71,8 @@ "url": "http://e107plugins.co.uk/news.php", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-28xx/CVE-2005-2837.json b/CVE-2005/CVE-2005-28xx/CVE-2005-2837.json index 9570c6f02ba..fa24bf6a991 100644 --- a/CVE-2005/CVE-2005-28xx/CVE-2005-2837.json +++ b/CVE-2005/CVE-2005-28xx/CVE-2005-2837.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2837", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-07T20:03:00.000", - "lastModified": "2008-09-05T20:52:47.953", + "lastModified": "2024-02-14T16:53:58.427", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -58,98 +58,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:5.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B7A203DC-CA3E-4621-A6BE-ED8F255C208A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:5.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "67669841-818A-4FA1-8E18-80E16E7BCC32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1FB8E748-432A-4E69-AAFF-B28D20F7E494" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "709F71B4-BD5E-4E9A-8446-7FA926D9FDFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "753F916C-00D1-4769-A3F9-FF21A813BE91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ABF27FC8-334D-4B66-8807-E81BCBBB7D35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D33B4C4A-D04F-4168-AA45-A7FF2863AE5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "AAFE16FB-E626-4B65-A3EC-F224444B982A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "BCB1E1F8-0CB6-4033-AF2F-BFAB0E271257" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8EBA87C1-9DF1-463D-B52E-9ED9BEEACB45" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "CF195F46-24C2-4CC1-B078-703E62940D47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "EFC6853C-457C-4DEA-9E53-7C9BA6B2F30F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E92144A-C66C-4959-B06A-39283EE43915" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "607C1B59-8C27-48D1-B4F2-8C7CCA293E32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.5.0_beta:*:*:*:*:*:*:*", - "matchCriteriaId": "81A94D77-7CFD-45C7-97BC-99CB02461E19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6F6C4F60-45AF-4888-BC79-229943953D9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BA8972F3-4AEA-4572-9177-9E3D9A34BB18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C6933824-00C3-4F0F-A705-83A8DFB7667D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:plain_black:webgui:6.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "58471E98-F111-4119-8C94-F978823ADFD1" + "criteria": "cpe:2.3:a:plainblack:webgui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "B9EDB4D2-DC25-41D4-813A-DBE685F8D87F" } ] } @@ -161,6 +72,7 @@ "url": "http://www.plainblack.com/getwebgui/advisories/security-exploit-found-in-6.x-versions", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -169,7 +81,10 @@ "url": "http://www.securityfocus.com/bid/14732", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2005/CVE-2005-28xx/CVE-2005-2840.json b/CVE-2005/CVE-2005-28xx/CVE-2005-2840.json index 87571d80ef3..76c1db19a59 100644 --- a/CVE-2005/CVE-2005-28xx/CVE-2005-2840.json +++ b/CVE-2005/CVE-2005-28xx/CVE-2005-2840.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2840", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-07T20:03:00.000", - "lastModified": "2008-09-05T20:52:48.440", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-28xx/CVE-2005-2858.json b/CVE-2005/CVE-2005-28xx/CVE-2005-2858.json index 3c809f83acc..f41e4b20270 100644 --- a/CVE-2005/CVE-2005-28xx/CVE-2005-2858.json +++ b/CVE-2005/CVE-2005-28xx/CVE-2005-2858.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2858", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-08T10:03:00.000", - "lastModified": "2008-09-05T20:52:51.110", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,12 +67,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16685", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.infogreg.com/security/im/rediff-bol-7-exposes-wab.html", "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-28xx/CVE-2005-2868.json b/CVE-2005/CVE-2005-28xx/CVE-2005-2868.json index c5f39a34da3..f5b0e28985b 100644 --- a/CVE-2005/CVE-2005-28xx/CVE-2005-2868.json +++ b/CVE-2005/CVE-2005-28xx/CVE-2005-2868.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2868", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-08T23:03:00.000", - "lastModified": "2008-09-05T20:52:52.580", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -67,12 +67,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/16542", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.spyinstructors.com/show.php?name=Advisories&pa=showpage&pid=65", "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2005/CVE-2005-29xx/CVE-2005-2979.json b/CVE-2005/CVE-2005-29xx/CVE-2005-2979.json index 86e4afbec3b..b6770a521f4 100644 --- a/CVE-2005/CVE-2005-29xx/CVE-2005-2979.json +++ b/CVE-2005/CVE-2005-29xx/CVE-2005-2979.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2979", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-20T00:03:00.000", - "lastModified": "2017-07-11T01:33:04.157", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,19 @@ "url": "http://marc.info/?l=bugtraq&m=112680539610442&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/16826/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.irannetjob.com/index.php?option=com_content&task=view&id=122&Itemid=28", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/14833", diff --git a/CVE-2005/CVE-2005-29xx/CVE-2005-2980.json b/CVE-2005/CVE-2005-29xx/CVE-2005-2980.json index a60b3bce7df..332ed47c143 100644 --- a/CVE-2005/CVE-2005-29xx/CVE-2005-2980.json +++ b/CVE-2005/CVE-2005-29xx/CVE-2005-2980.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2980", "sourceIdentifier": "cve@mitre.org", "published": "2005-09-20T00:03:00.000", - "lastModified": "2017-07-11T01:33:04.203", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,9 +71,19 @@ "url": "http://marc.info/?l=bugtraq&m=112680539610442&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/16826/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.irannetjob.com/index.php?option=com_content&task=view&id=122&Itemid=28", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/14835", diff --git a/CVE-2005/CVE-2005-31xx/CVE-2005-3159.json b/CVE-2005/CVE-2005-31xx/CVE-2005-3159.json index 2e2e71ee6fb..7458094e241 100644 --- a/CVE-2005/CVE-2005-31xx/CVE-2005-3159.json +++ b/CVE-2005/CVE-2005-31xx/CVE-2005-3159.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3159", "sourceIdentifier": "cve@mitre.org", "published": "2005-10-06T10:02:00.000", - "lastModified": "2016-10-18T03:33:15.563", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -96,11 +96,16 @@ "url": "http://marc.info/?l=bugtraq&m=112811077320676&w=2", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/18708", + "source": "cve@mitre.org" + }, { "url": "http://www.s4a.cc/forum/archive/index.php/t-3585.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-31xx/CVE-2005-3184.json b/CVE-2005/CVE-2005-31xx/CVE-2005-3184.json index 850f1c5fc2c..714345fa517 100644 --- a/CVE-2005/CVE-2005-31xx/CVE-2005-3184.json +++ b/CVE-2005/CVE-2005-31xx/CVE-2005-3184.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3184", "sourceIdentifier": "cve@mitre.org", "published": "2005-10-20T23:02:00.000", - "lastModified": "2017-10-11T01:30:23.640", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -68,13 +68,40 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1015082", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-25.xml", @@ -92,6 +119,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/20137", + "source": "cve@mitre.org" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3241.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3241.json index 66130d191d0..7687c71d38f 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3241.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3241.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3241", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.060", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -222,6 +222,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21813", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -234,7 +262,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -245,6 +274,22 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20121", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20122", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20123", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20124", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3242.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3242.json index 39d4866da1b..8817b53472e 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3242.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3242.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3242", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.123", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -177,6 +177,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21813", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -189,7 +217,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -200,6 +229,14 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20125", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20133", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3243.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3243.json index 5b956da8871..42041e5db6f 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3243.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3243.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3243", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.203", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -207,6 +207,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21813", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -219,7 +247,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -234,6 +263,14 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20126", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20135", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3244.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3244.json index c4f9f54eaa9..14a5e85b8c6 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3244.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3244.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3244", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.263", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -112,6 +112,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21813", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -124,7 +152,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -135,6 +164,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20127", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3245.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3245.json index 846fdf80261..af645272cc4 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3245.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3245.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3245", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.343", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -112,6 +112,30 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -120,7 +144,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -131,6 +156,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20129", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3246.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3246.json index 1bd76cf39ed..5e002631071 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3246.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3246.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3246", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.420", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -142,6 +142,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21813", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -154,7 +182,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -165,6 +194,18 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20128", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20130", + "source": "secalert@redhat.com" + }, + { + "url": "http://www.osvdb.org/20131", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3247.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3247.json index a1995211911..28df8feea15 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3247.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3247.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3247", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.513", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,6 +67,30 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -75,7 +99,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -86,6 +111,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20132", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3248.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3248.json index ff4daeb06b0..2846f57e228 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3248.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3248.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3248", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.577", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -122,6 +122,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21813", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -134,7 +162,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { @@ -145,6 +174,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20134", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3249.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3249.json index f947816d235..e1843d57f50 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3249.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3249.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3249", "sourceIdentifier": "secalert@redhat.com", "published": "2005-10-27T10:02:00.000", - "lastModified": "2017-10-11T01:30:24.657", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -122,6 +122,30 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17254", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17286", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17327", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17392", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015082", "source": "secalert@redhat.com" @@ -130,7 +154,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00021.html", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { @@ -141,6 +166,10 @@ "url": "http://www.novell.com/linux/security/advisories/2005_25_sr.html", "source": "secalert@redhat.com" }, + { + "url": "http://www.osvdb.org/20136", + "source": "secalert@redhat.com" + }, { "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html", "source": "secalert@redhat.com" diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3264.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3264.json index 637e00603bf..95f70d92348 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3264.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3264.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3264", "sourceIdentifier": "cve@mitre.org", "published": "2005-10-20T10:02:00.000", - "lastModified": "2016-10-18T03:34:14.857", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,13 +77,21 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://marc.info/?l=bugtraq&m=112907042504220&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/17175/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/15078", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json b/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json index aff993e4bcf..ce18484d6ca 100644 --- a/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json +++ b/CVE-2005/CVE-2005-33xx/CVE-2005-3302.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3302", "sourceIdentifier": "cve@mitre.org", "published": "2005-10-24T10:02:00.000", - "lastModified": "2008-09-05T20:54:00.590", + "lastModified": "2024-02-14T15:47:36.403", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-94" } ] } @@ -64,6 +64,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" + } + ] + } + ] } ], "references": [ @@ -72,16 +87,32 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19754", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" ] }, { "url": "http://www.debian.org/security/2006/dsa-1039", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/17663", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-33xx/CVE-2005-3313.json b/CVE-2005/CVE-2005-33xx/CVE-2005-3313.json index 202da649ab3..44836a7dc79 100644 --- a/CVE-2005/CVE-2005-33xx/CVE-2005-3313.json +++ b/CVE-2005/CVE-2005-33xx/CVE-2005-3313.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3313", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-01T12:47:00.000", - "lastModified": "2017-10-11T01:30:25.420", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -261,13 +261,51 @@ "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/17370", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/17377", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17480", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18331", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18426", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18911", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/19130", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/19230", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1015414", "source": "cve@mitre.org" }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-25.xml", diff --git a/CVE-2005/CVE-2005-34xx/CVE-2005-3475.json b/CVE-2005/CVE-2005-34xx/CVE-2005-3475.json index cae68089811..21617cb1499 100644 --- a/CVE-2005/CVE-2005-34xx/CVE-2005-3475.json +++ b/CVE-2005/CVE-2005-34xx/CVE-2005-3475.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3475", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-03T02:02:00.000", - "lastModified": "2017-07-11T01:33:12.220", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0572.html", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/20447", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15225", "source": "cve@mitre.org", @@ -80,7 +84,10 @@ }, { "url": "http://www.x0n3-h4ck.org/index.php?name=news&article=92", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24657", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3512.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3512.json index 5ec1cf2efaa..49053fc7653 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3512.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3512.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3512", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-06T11:02:00.000", - "lastModified": "2016-10-18T03:35:56.607", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,10 @@ "references": [ { "url": "http://irannetjob.com/content/view/152/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=113087965608496&w=2", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3513.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3513.json index 6e11bbe39a8..90c2434a3b7 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3513.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3513.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3513", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-06T11:02:00.000", - "lastModified": "2016-10-18T03:35:57.983", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,10 @@ "references": [ { "url": "http://irannetjob.com/content/view/152/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=113087965608496&w=2", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3514.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3514.json index 443eb338fc4..de57f1b3c77 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3514.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3514.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3514", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-06T11:02:00.000", - "lastModified": "2017-07-11T01:33:12.457", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,16 +69,42 @@ "references": [ { "url": "http://irannetjob.com/content/view/148/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112982490104274&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/17239/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/96", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/20164", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/20165", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/20166", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/20167", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15149/", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3515.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3515.json index 85d038d2f34..24c255fd1af 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3515.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3515.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3515", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-06T11:02:00.000", - "lastModified": "2017-07-11T01:33:12.533", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,16 +69,30 @@ "references": [ { "url": "http://irannetjob.com/content/view/148/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112982490104274&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/17262/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/96", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/20168", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15149/", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3516.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3516.json index 0fe56a8a0fa..e10ef821e64 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3516.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3516.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3516", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-06T11:02:00.000", - "lastModified": "2017-07-11T01:33:12.597", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,16 +69,30 @@ "references": [ { "url": "http://irannetjob.com/content/view/148/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112982490104274&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/17283/", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/96", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/20169", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15149/", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3517.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3517.json index 109b7f5dccd..e482859f1bb 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3517.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3517.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3517", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-06T11:02:00.000", - "lastModified": "2017-07-11T01:33:12.643", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,10 @@ "references": [ { "url": "http://irannetjob.com/content/view/148/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=112982490104274&w=2", @@ -79,6 +82,10 @@ "url": "http://securityreason.com/securityalert/96", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/20170", + "source": "cve@mitre.org" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22825", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3545.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3545.json index ec58d5a2182..56a6de4ffd1 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3545.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3545.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3545", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-16T07:42:00.000", - "lastModified": "2018-10-19T15:37:00.517", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,17 +72,35 @@ } ], "references": [ + { + "url": "http://osvdb.org/20514", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/17457", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/151", "source": "cve@mitre.org" }, { "url": "http://www.ibproarcade.com/index.php?showtopic=7575&pid=47370&st=0&#entry47370", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.ibproarcade.com/index.php?showtopic=7576&pid=47373&st=0&#entry47373", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/415793", diff --git a/CVE-2005/CVE-2005-35xx/CVE-2005-3586.json b/CVE-2005/CVE-2005-35xx/CVE-2005-3586.json index a87ac361f3f..711563e9499 100644 --- a/CVE-2005/CVE-2005-35xx/CVE-2005-3586.json +++ b/CVE-2005/CVE-2005-35xx/CVE-2005-3586.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3586", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-16T07:42:00.000", - "lastModified": "2016-10-18T03:36:19.533", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -87,7 +87,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-36xx/CVE-2005-3638.json b/CVE-2005/CVE-2005-36xx/CVE-2005-3638.json index 7df5e9546f1..8396f9fce25 100644 --- a/CVE-2005/CVE-2005-36xx/CVE-2005-3638.json +++ b/CVE-2005/CVE-2005-36xx/CVE-2005-3638.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3638", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-16T21:22:00.000", - "lastModified": "2011-03-08T02:26:54.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,6 +73,13 @@ "references": [ { "url": "http://irannetjob.com/content/view/162/28/", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/17569", "source": "cve@mitre.org" }, { @@ -83,6 +90,10 @@ "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/20844", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15443", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-36xx/CVE-2005-3651.json b/CVE-2005/CVE-2005-36xx/CVE-2005-3651.json index 97f83ff2c1d..fd1a564ed83 100644 --- a/CVE-2005/CVE-2005-36xx/CVE-2005-3651.json +++ b/CVE-2005/CVE-2005-36xx/CVE-2005-3651.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3651", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-10T11:03:00.000", - "lastModified": "2017-10-11T01:30:27.843", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -263,12 +263,47 @@ }, { "url": "http://anonsvn.ethereal.com/viewcvs/viewcvs.py/trunk/epan/dissectors/packet-ospf.c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/17973", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18012", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18062", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18331", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18426", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18911", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/19012", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/19230", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/247", "source": "cve@mitre.org" @@ -283,7 +318,10 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-06.xml", diff --git a/CVE-2005/CVE-2005-36xx/CVE-2005-3688.json b/CVE-2005/CVE-2005-36xx/CVE-2005-3688.json index 877e6355559..ece9acddf8d 100644 --- a/CVE-2005/CVE-2005-36xx/CVE-2005-3688.json +++ b/CVE-2005/CVE-2005-36xx/CVE-2005-3688.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3688", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-19T01:03:00.000", - "lastModified": "2021-04-29T15:15:09.807", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -109,7 +109,15 @@ "url": "http://irannetjob.com/content/view/163/28/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/17642", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2005/CVE-2005-36xx/CVE-2005-3689.json b/CVE-2005/CVE-2005-36xx/CVE-2005-3689.json index 629926a6662..d7c2a9dd45c 100644 --- a/CVE-2005/CVE-2005-36xx/CVE-2005-3689.json +++ b/CVE-2005/CVE-2005-36xx/CVE-2005-3689.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3689", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-19T01:03:00.000", - "lastModified": "2021-04-29T15:15:09.873", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -84,6 +84,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/17642", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, diff --git a/CVE-2005/CVE-2005-37xx/CVE-2005-3770.json b/CVE-2005/CVE-2005-37xx/CVE-2005-3770.json index 262591cf4f0..23fb6fa1e91 100644 --- a/CVE-2005/CVE-2005-37xx/CVE-2005-3770.json +++ b/CVE-2005/CVE-2005-37xx/CVE-2005-3770.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3770", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-23T00:03:00.000", - "lastModified": "2018-10-19T15:39:04.480", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,9 +72,25 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/17706", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/21057", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/21059", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/417434/30/0/threaded", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-38xx/CVE-2005-3814.json b/CVE-2005/CVE-2005-38xx/CVE-2005-3814.json index da6f432208b..748befcef02 100644 --- a/CVE-2005/CVE-2005-38xx/CVE-2005-3814.json +++ b/CVE-2005/CVE-2005-38xx/CVE-2005-3814.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3814", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-26T02:03:00.000", - "lastModified": "2011-03-08T02:27:12.627", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,17 @@ "references": [ { "url": "http://nightmaresecurity.net/index.php?showtopic=1015", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/17736", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securitytracker.com/id?1015259", @@ -83,6 +93,18 @@ "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/21090", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/21091", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/21092", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15567", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-39xx/CVE-2005-3924.json b/CVE-2005/CVE-2005-39xx/CVE-2005-3924.json index d0a25967896..fc066c77864 100644 --- a/CVE-2005/CVE-2005-39xx/CVE-2005-3924.json +++ b/CVE-2005/CVE-2005-39xx/CVE-2005-3924.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3924", "sourceIdentifier": "cve@mitre.org", "published": "2005-11-30T11:03:00.000", - "lastModified": "2011-03-08T02:27:23.453", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/17782", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/213", "source": "cve@mitre.org" @@ -82,9 +89,14 @@ "url": "http://www.blogcu.com/Liz0ziM/112800/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/21213", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15599", "source": "cve@mitre.org", diff --git a/CVE-2005/CVE-2005-39xx/CVE-2005-3947.json b/CVE-2005/CVE-2005-39xx/CVE-2005-3947.json index ab22b4d8615..beb24d2c17d 100644 --- a/CVE-2005/CVE-2005-39xx/CVE-2005-3947.json +++ b/CVE-2005/CVE-2005-39xx/CVE-2005-3947.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3947", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-01T06:03:00.000", - "lastModified": "2017-07-20T01:29:06.893", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,7 +78,8 @@ "url": "http://www.blogcu.com/Liz0ziM/126975", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-39xx/CVE-2005-3968.json b/CVE-2005/CVE-2005-39xx/CVE-2005-3968.json index 75104af7311..1a5c87d5df1 100644 --- a/CVE-2005/CVE-2005-39xx/CVE-2005-3968.json +++ b/CVE-2005/CVE-2005-39xx/CVE-2005-3968.json @@ -2,7 +2,7 @@ "id": "CVE-2005-3968", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-03T19:03:00.000", - "lastModified": "2018-10-19T15:39:46.390", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -120,6 +120,14 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/17858", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015300", "source": "cve@mitre.org", @@ -127,11 +135,16 @@ "Exploit" ] }, + { + "url": "http://www.osvdb.org/21384", + "source": "cve@mitre.org" + }, { "url": "http://www.phpx.org/news.php?news_id=139", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-40xx/CVE-2005-4006.json b/CVE-2005/CVE-2005-40xx/CVE-2005-4006.json index 5385d6dc1fc..bef026b20bc 100644 --- a/CVE-2005/CVE-2005-40xx/CVE-2005-4006.json +++ b/CVE-2005/CVE-2005-40xx/CVE-2005-4006.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4006", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-05T01:03:00.000", - "lastModified": "2012-10-22T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -95,12 +95,27 @@ "references": [ { "url": "http://sapid-club.com/en/viewtopic.php?p=586#586", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/17859", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=375289&group_id=118100", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/21389", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/15689", "source": "cve@mitre.org" diff --git a/CVE-2005/CVE-2005-40xx/CVE-2005-4007.json b/CVE-2005/CVE-2005-40xx/CVE-2005-4007.json index 131374af231..324e4378f71 100644 --- a/CVE-2005/CVE-2005-40xx/CVE-2005-4007.json +++ b/CVE-2005/CVE-2005-40xx/CVE-2005-4007.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4007", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-05T01:03:00.000", - "lastModified": "2012-10-22T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -95,7 +95,10 @@ "references": [ { "url": "http://sapid-club.com/en/viewtopic.php?p=586#586", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=375289&group_id=118100", diff --git a/CVE-2005/CVE-2005-42xx/CVE-2005-4249.json b/CVE-2005/CVE-2005-42xx/CVE-2005-4249.json index 8ab5b358ff9..716a483aec9 100644 --- a/CVE-2005/CVE-2005-42xx/CVE-2005-4249.json +++ b/CVE-2005/CVE-2005-42xx/CVE-2005-4249.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4249", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-15T11:03:00.000", - "lastModified": "2018-10-19T15:40:42.287", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/18027", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/253", "source": "cve@mitre.org" @@ -95,7 +102,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-45xx/CVE-2005-4526.json b/CVE-2005/CVE-2005-45xx/CVE-2005-4526.json index d036194256e..e13a4bbcd3a 100644 --- a/CVE-2005/CVE-2005-45xx/CVE-2005-4526.json +++ b/CVE-2005/CVE-2005-45xx/CVE-2005-4526.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4526", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-28T01:03:00.000", - "lastModified": "2018-10-19T15:41:09.880", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -101,7 +101,8 @@ "url": "http://www.digitalarmaments.com/2005161283546323.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2005/CVE-2005-45xx/CVE-2005-4585.json b/CVE-2005/CVE-2005-45xx/CVE-2005-4585.json index 6dd7db658c1..f609e15a785 100644 --- a/CVE-2005/CVE-2005-45xx/CVE-2005-4585.json +++ b/CVE-2005/CVE-2005-45xx/CVE-2005-4585.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4585", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-29T11:03:00.000", - "lastModified": "2017-10-11T01:30:30.953", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -220,6 +220,30 @@ "url": "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/18229", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18426", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/18911", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/19012", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/19230", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/304", "source": "cve@mitre.org" @@ -233,6 +257,13 @@ }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00022.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/22092", "source": "cve@mitre.org" }, { diff --git a/CVE-2005/CVE-2005-47xx/CVE-2005-4747.json b/CVE-2005/CVE-2005-47xx/CVE-2005-4747.json index da5426c54ad..4c3293ec4c7 100644 --- a/CVE-2005/CVE-2005-47xx/CVE-2005-4747.json +++ b/CVE-2005/CVE-2005-47xx/CVE-2005-4747.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4747", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:57:42.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,7 +102,10 @@ }, { "url": "http://www.webhostautomation.com/webhost-301", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json b/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json index 153b167d4a4..ce2300a2270 100644 --- a/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json +++ b/CVE-2005/CVE-2005-47xx/CVE-2005-4780.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4780", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2023-11-07T01:58:13.670", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ }, { "url": "http://www.lighthouse-cms.de/en/news/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.osvdb.org/21852", diff --git a/CVE-2005/CVE-2005-48xx/CVE-2005-4821.json b/CVE-2005/CVE-2005-48xx/CVE-2005-4821.json index e7233069390..337bd0feffa 100644 --- a/CVE-2005/CVE-2005-48xx/CVE-2005-4821.json +++ b/CVE-2005/CVE-2005-48xx/CVE-2005-4821.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4821", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:57:55.797", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -81,7 +81,22 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/19504", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/19505", + "source": "cve@mitre.org", + "tags": [ + "Exploit" ] }, { diff --git a/CVE-2005/CVE-2005-48xx/CVE-2005-4860.json b/CVE-2005/CVE-2005-48xx/CVE-2005-4860.json index aaa720c3ba5..16815bc579d 100644 --- a/CVE-2005/CVE-2005-48xx/CVE-2005-4860.json +++ b/CVE-2005/CVE-2005-48xx/CVE-2005-4860.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4860", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:58:02.170", + "lastModified": "2024-02-14T16:54:03.350", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-327" } ] } @@ -58,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:spectrum:cash_receipting_system:*:*:*:*:*:*:*:*", - "versionEndIncluding": "6.406.08", - "matchCriteriaId": "B66D364A-D9C0-4C09-BA16-FF27009961F1" + "criteria": "cpe:2.3:a:spectrumcu:cash_receipting_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.504", + "matchCriteriaId": "C0CA4382-A7D1-4F20-B731-AF88C3D13AE7" } ] } @@ -70,11 +92,25 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=111229613907550&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/13985", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://www.portcullis.co.uk/uplds/advisories/Portcullis%20Security%20Advisory%2005-002%20Spectrum%20Cash%20Receipting%20System%20Weak%20Password%20Protection%20Vulnerability.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-01xx/CVE-2006-0146.json b/CVE-2006/CVE-2006-01xx/CVE-2006-0146.json index fe5143d3c72..c2d3ea28e15 100644 --- a/CVE-2006/CVE-2006-01xx/CVE-2006-0146.json +++ b/CVE-2006/CVE-2006-01xx/CVE-2006-0146.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0146", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-09T23:03:00.000", - "lastModified": "2018-10-19T15:42:50.527", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -109,6 +109,131 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/17418", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18233", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18254", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18260", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18267", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18276", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18720", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19555", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19563", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19590", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19591", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19600", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19691", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19699", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24954", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2005-64/advisory/", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/713", "source": "cve@mitre.org" @@ -147,7 +272,18 @@ }, { "url": "http://www.maxdev.com/Article550.phtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/22290", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch" + ] }, { "url": "http://www.securityfocus.com/archive/1/423784/100/0/threaded", diff --git a/CVE-2006/CVE-2006-01xx/CVE-2006-0150.json b/CVE-2006/CVE-2006-01xx/CVE-2006-0150.json index ad0d51e56c3..14ea05f4246 100644 --- a/CVE-2006/CVE-2006-01xx/CVE-2006-0150.json +++ b/CVE-2006/CVE-2006-01xx/CVE-2006-0150.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0150", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-09T23:03:00.000", - "lastModified": "2018-10-19T15:42:57.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -127,6 +127,38 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/18382", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18405", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18412", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/18568", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015456", "source": "cve@mitre.org" @@ -143,7 +175,8 @@ "url": "http://www.digitalarmaments.com/2006090173928420.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-02xx/CVE-2006-0211.json b/CVE-2006/CVE-2006-02xx/CVE-2006-0211.json index 7e052a2220c..60c330c379c 100644 --- a/CVE-2006/CVE-2006-02xx/CVE-2006-0211.json +++ b/CVE-2006/CVE-2006-02xx/CVE-2006-0211.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0211", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-14T01:03:00.000", - "lastModified": "2018-10-19T15:43:13.077", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,6 +67,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/18492", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/22454", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/421791/100/0/threaded", "source": "cve@mitre.org" @@ -81,7 +89,10 @@ }, { "url": "http://www.webhostautomation.com/webhost-301", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24139", diff --git a/CVE-2006/CVE-2006-02xx/CVE-2006-0250.json b/CVE-2006/CVE-2006-02xx/CVE-2006-0250.json index bb299f85014..4a2e40a9a6e 100644 --- a/CVE-2006/CVE-2006-02xx/CVE-2006-0250.json +++ b/CVE-2006/CVE-2006-02xx/CVE-2006-0250.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0250", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-18T01:51:00.000", - "lastModified": "2018-10-19T15:43:29.623", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,22 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/18525", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.digitalarmaments.com/2006040164883273.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/22493", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-03xx/CVE-2006-0306.json b/CVE-2006/CVE-2006-03xx/CVE-2006-0306.json index c221c923eaf..7805e129e9e 100644 --- a/CVE-2006/CVE-2006-03xx/CVE-2006-0306.json +++ b/CVE-2006/CVE-2006-03xx/CVE-2006-0306.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0306", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-19T00:03:00.000", - "lastModified": "2021-04-13T20:13:15.647", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -142,6 +142,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/18531", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015504", "source": "cve@mitre.org" @@ -157,9 +164,14 @@ "url": "http://www.designfolks.com.au/karma/DMPrimer/", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/22529", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/422381/100/0/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-03xx/CVE-2006-0310.json b/CVE-2006/CVE-2006-03xx/CVE-2006-0310.json index d103e685c60..9e38f52e414 100644 --- a/CVE-2006/CVE-2006-03xx/CVE-2006-0310.json +++ b/CVE-2006/CVE-2006-03xx/CVE-2006-0310.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0310", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-19T01:03:00.000", - "lastModified": "2017-07-20T01:29:38.660", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,6 +81,20 @@ }, { "url": "http://mikeheltonisawesome.com/viewcomments.php?idd=46", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/16889", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/22526", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-03xx/CVE-2006-0311.json b/CVE-2006/CVE-2006-03xx/CVE-2006-0311.json index 3b85957c0b4..723365afa81 100644 --- a/CVE-2006/CVE-2006-03xx/CVE-2006-0311.json +++ b/CVE-2006/CVE-2006-03xx/CVE-2006-0311.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0311", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-19T01:03:00.000", - "lastModified": "2017-07-20T01:29:38.723", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,6 +81,20 @@ }, { "url": "http://mikeheltonisawesome.com/viewcomments.php?idd=46", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/16889", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/22527", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-03xx/CVE-2006-0312.json b/CVE-2006/CVE-2006-03xx/CVE-2006-0312.json index e8070077fd2..a42d4e3287e 100644 --- a/CVE-2006/CVE-2006-03xx/CVE-2006-0312.json +++ b/CVE-2006/CVE-2006-03xx/CVE-2006-0312.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0312", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-19T01:03:00.000", - "lastModified": "2017-07-20T01:29:38.770", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,7 +81,17 @@ }, { "url": "http://mikeheltonisawesome.com/viewcomments.php?idd=46", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/16889", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/16286", diff --git a/CVE-2006/CVE-2006-03xx/CVE-2006-0370.json b/CVE-2006/CVE-2006-03xx/CVE-2006-0370.json index 649e2582990..d9d86c6d463 100644 --- a/CVE-2006/CVE-2006-03xx/CVE-2006-0370.json +++ b/CVE-2006/CVE-2006-03xx/CVE-2006-0370.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0370", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-22T20:03:00.000", - "lastModified": "2018-10-19T15:44:33.457", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,12 +75,26 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/18547", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015523", "source": "cve@mitre.org" }, { "url": "http://www.fluffington.com/index.php?page=rcblog", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/22679", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-03xx/CVE-2006-0371.json b/CVE-2006/CVE-2006-03xx/CVE-2006-0371.json index dfc7a7220aa..42f341a15a0 100644 --- a/CVE-2006/CVE-2006-03xx/CVE-2006-0371.json +++ b/CVE-2006/CVE-2006-03xx/CVE-2006-0371.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0371", "sourceIdentifier": "cve@mitre.org", "published": "2006-01-22T20:03:00.000", - "lastModified": "2018-10-19T15:44:33.753", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,12 +75,26 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/18547", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015523", "source": "cve@mitre.org" }, { "url": "http://www.fluffington.com/index.php?page=rcblog", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/22680", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-05xx/CVE-2006-0578.json b/CVE-2006/CVE-2006-05xx/CVE-2006-0578.json index 742bd1a5b58..4348f849a41 100644 --- a/CVE-2006/CVE-2006-05xx/CVE-2006-0578.json +++ b/CVE-2006/CVE-2006-05xx/CVE-2006-0578.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0578", "sourceIdentifier": "cve@mitre.org", "published": "2006-02-08T01:02:00.000", - "lastModified": "2018-10-30T16:25:17.857", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/18622", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015644", "source": "cve@mitre.org" @@ -79,11 +86,16 @@ "url": "http://www.bluecoat.com/support/knowledge/advisory_connect_denial_ignore.html", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/22853", + "source": "cve@mitre.org" + }, { "url": "http://www.secumind.net/content/french/modules/news/article.php?storyid=8", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-05xx/CVE-2006-0587.json b/CVE-2006/CVE-2006-05xx/CVE-2006-0587.json index 0660242974d..a67562525b8 100644 --- a/CVE-2006/CVE-2006-05xx/CVE-2006-0587.json +++ b/CVE-2006/CVE-2006-05xx/CVE-2006-0587.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0587", "sourceIdentifier": "cve@mitre.org", "published": "2006-02-08T01:02:00.000", - "lastModified": "2017-07-20T01:29:54.190", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -161,6 +161,14 @@ "Patch" ] }, + { + "url": "http://secunia.com/advisories/18735", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015641", "source": "cve@mitre.org", @@ -170,6 +178,20 @@ }, { "url": "http://www.digitalarmaments.com/2006140293402395.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/22944", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.osvdb.org/23256", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-08xx/CVE-2006-0874.json b/CVE-2006/CVE-2006-08xx/CVE-2006-0874.json index a14f38d43e2..8b58d510d40 100644 --- a/CVE-2006/CVE-2006-08xx/CVE-2006-0874.json +++ b/CVE-2006/CVE-2006-08xx/CVE-2006-0874.json @@ -2,7 +2,7 @@ "id": "CVE-2006-0874", "sourceIdentifier": "cve@mitre.org", "published": "2006-02-24T11:02:00.000", - "lastModified": "2017-07-20T01:30:08.787", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -68,9 +68,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19003", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.intensivepoint.com/iuser-document.shtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/16787", diff --git a/CVE-2006/CVE-2006-10xx/CVE-2006-1072.json b/CVE-2006/CVE-2006-10xx/CVE-2006-1072.json index 18aafa73d3d..33ad3b7b1a7 100644 --- a/CVE-2006/CVE-2006-10xx/CVE-2006-1072.json +++ b/CVE-2006/CVE-2006-10xx/CVE-2006-1072.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1072", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-08T00:02:00.000", - "lastModified": "2018-10-18T16:30:34.010", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -70,7 +70,10 @@ "references": [ { "url": "http://notlegal.ws/simplogsploit.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/426769/100/0/threaded", diff --git a/CVE-2006/CVE-2006-10xx/CVE-2006-1073.json b/CVE-2006/CVE-2006-10xx/CVE-2006-1073.json index 2dc3edcb194..2ca32576f00 100644 --- a/CVE-2006/CVE-2006-10xx/CVE-2006-1073.json +++ b/CVE-2006/CVE-2006-10xx/CVE-2006-1073.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1073", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-08T00:02:00.000", - "lastModified": "2018-10-18T16:30:34.307", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -70,7 +70,17 @@ "references": [ { "url": "http://notlegal.ws/simplogsploit.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/19115", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/542", diff --git a/CVE-2006/CVE-2006-10xx/CVE-2006-1080.json b/CVE-2006/CVE-2006-10xx/CVE-2006-1080.json index 719b81c4d37..260b56b2738 100644 --- a/CVE-2006/CVE-2006-10xx/CVE-2006-1080.json +++ b/CVE-2006/CVE-2006-10xx/CVE-2006-1080.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1080", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-09T00:02:00.000", - "lastModified": "2018-10-18T16:30:37.993", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,14 @@ "url": "http://notlegal.ws/gamepanel.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://secunia.com/advisories/19143", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/426825/100/0/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-11xx/CVE-2006-1107.json b/CVE-2006/CVE-2006-11xx/CVE-2006-1107.json index 9bb12352084..61ad1ee1fa9 100644 --- a/CVE-2006/CVE-2006-11xx/CVE-2006-1107.json +++ b/CVE-2006/CVE-2006-11xx/CVE-2006-1107.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1107", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-09T13:06:00.000", - "lastModified": "2018-10-18T16:30:46.603", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability affects NMDeluxe versions 1.0 and previous.\r\n", "descriptions": [ @@ -79,7 +79,16 @@ "url": "http://nmdeluxe.com/index.php", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/19117", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-11xx/CVE-2006-1108.json b/CVE-2006/CVE-2006-11xx/CVE-2006-1108.json index 730f2959b20..4d4ab07248c 100644 --- a/CVE-2006/CVE-2006-11xx/CVE-2006-1108.json +++ b/CVE-2006/CVE-2006-11xx/CVE-2006-1108.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1108", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-09T13:06:00.000", - "lastModified": "2018-10-18T16:30:47.137", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability affcts NMDeluxe versions 1.0 and previous.", "descriptions": [ @@ -79,7 +79,16 @@ "url": "http://nmdeluxe.com/index.php", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/19117", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-12xx/CVE-2006-1202.json b/CVE-2006/CVE-2006-12xx/CVE-2006-1202.json index d5b8c080d80..83232ac669f 100644 --- a/CVE-2006/CVE-2006-12xx/CVE-2006-1202.json +++ b/CVE-2006/CVE-2006-12xx/CVE-2006-1202.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1202", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-14T01:06:00.000", - "lastModified": "2018-10-18T16:31:20.323", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,7 +69,17 @@ "references": [ { "url": "http://notlegal.ws/textfilebbmessanger.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/19149", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securitytracker.com/id?1015744", diff --git a/CVE-2006/CVE-2006-12xx/CVE-2006-1207.json b/CVE-2006/CVE-2006-12xx/CVE-2006-1207.json index 379ad6ac22a..3685b64451d 100644 --- a/CVE-2006/CVE-2006-12xx/CVE-2006-1207.json +++ b/CVE-2006/CVE-2006-12xx/CVE-2006-1207.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1207", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-14T01:06:00.000", - "lastModified": "2018-10-18T16:31:23.090", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,11 +76,21 @@ }, { "url": "http://www.blogcu.com/Liz0ziM/317250/", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/23627", "source": "cve@mitre.org" }, { "url": "http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/427215/100/0/threaded", diff --git a/CVE-2006/CVE-2006-12xx/CVE-2006-1208.json b/CVE-2006/CVE-2006-12xx/CVE-2006-1208.json index 3da3a1e023c..ac4ce4d5639 100644 --- a/CVE-2006/CVE-2006-12xx/CVE-2006-1208.json +++ b/CVE-2006/CVE-2006-12xx/CVE-2006-1208.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1208", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-14T01:06:00.000", - "lastModified": "2018-10-18T16:31:23.387", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/19107", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/564", "source": "cve@mitre.org" @@ -82,13 +89,21 @@ "url": "http://www.blogcu.com/Liz0ziM/317250/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { - "url": "http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html", + "url": "http://www.osvdb.org/23626", "source": "cve@mitre.org" }, + { + "url": "http://www.scripts-by.net/PHP/File-Manipulation/php-upload-center.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/archive/1/427215/100/0/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-12xx/CVE-2006-1209.json b/CVE-2006/CVE-2006-12xx/CVE-2006-1209.json index 95bf88574b3..09c881d7050 100644 --- a/CVE-2006/CVE-2006-12xx/CVE-2006-1209.json +++ b/CVE-2006/CVE-2006-12xx/CVE-2006-1209.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1209", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-14T01:06:00.000", - "lastModified": "2018-10-18T16:31:23.870", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -109,6 +109,10 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/17134", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/565", "source": "cve@mitre.org" @@ -117,7 +121,8 @@ "url": "http://www.blogcu.com/Liz0ziM/316652/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-12xx/CVE-2006-1253.json b/CVE-2006/CVE-2006-12xx/CVE-2006-1253.json index f8d9dc1be3f..072b4523cf8 100644 --- a/CVE-2006/CVE-2006-12xx/CVE-2006-1253.json +++ b/CVE-2006/CVE-2006-12xx/CVE-2006-1253.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1253", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-19T01:02:00.000", - "lastModified": "2008-09-05T21:01:25.690", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -202,9 +202,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19221", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.glftpd.com/files/docs/changelog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/17118", diff --git a/CVE-2006/CVE-2006-13xx/CVE-2006-1379.json b/CVE-2006/CVE-2006-13xx/CVE-2006-1379.json index 4f5c521883b..dbcb7fcb6b9 100644 --- a/CVE-2006/CVE-2006-13xx/CVE-2006-1379.json +++ b/CVE-2006/CVE-2006-13xx/CVE-2006-1379.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1379", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-24T11:02:00.000", - "lastModified": "2011-03-08T02:32:57.017", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,12 +73,22 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19282", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_lang=english", "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-13xx/CVE-2006-1380.json b/CVE-2006/CVE-2006-13xx/CVE-2006-1380.json index 90bbbba37e0..c0fbd640d55 100644 --- a/CVE-2006/CVE-2006-13xx/CVE-2006-1380.json +++ b/CVE-2006/CVE-2006-13xx/CVE-2006-1380.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1380", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-24T11:02:00.000", - "lastModified": "2017-07-20T01:30:32.723", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,6 +67,25 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19022", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_lang=english", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.vupen.com/english/advisories/2006/1041", + "source": "cve@mitre.org" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25415", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-13xx/CVE-2006-1381.json b/CVE-2006/CVE-2006-13xx/CVE-2006-1381.json index ac1c54e8288..2e621b8c9d8 100644 --- a/CVE-2006/CVE-2006-13xx/CVE-2006-1381.json +++ b/CVE-2006/CVE-2006-13xx/CVE-2006-1381.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1381", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-24T11:02:00.000", - "lastModified": "2017-07-20T01:30:32.770", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,9 +67,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11576", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_lang=english", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/1041", diff --git a/CVE-2006/CVE-2006-15xx/CVE-2006-1585.json b/CVE-2006/CVE-2006-15xx/CVE-2006-1585.json index 8349a5a44b0..e1233cc94bb 100644 --- a/CVE-2006/CVE-2006-15xx/CVE-2006-1585.json +++ b/CVE-2006/CVE-2006-15xx/CVE-2006-1585.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1585", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-02T21:04:00.000", - "lastModified": "2018-10-18T16:33:30.640", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,13 +67,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19503", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/660", "source": "cve@mitre.org" }, { "url": "http://www.bash-x.net/undef/adv/monalbum.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/429475/100/0/threaded", diff --git a/CVE-2006/CVE-2006-16xx/CVE-2006-1667.json b/CVE-2006/CVE-2006-16xx/CVE-2006-1667.json index 49092a1325b..5e28827bd7a 100644 --- a/CVE-2006/CVE-2006-16xx/CVE-2006-1667.json +++ b/CVE-2006/CVE-2006-16xx/CVE-2006-1667.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1667", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-07T10:04:00.000", - "lastModified": "2017-10-19T01:29:05.033", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -69,15 +69,30 @@ "references": [ { "url": "http://bash-x.net/undef/adv/craftygallery.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://bash-x.net/undef/exploits/crappy_syntax.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://secunia.com/advisories/19478", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/24386", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/17379", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-16xx/CVE-2006-1668.json b/CVE-2006/CVE-2006-16xx/CVE-2006-1668.json index 3208ccf18b2..7a241f09bb1 100644 --- a/CVE-2006/CVE-2006-16xx/CVE-2006-1668.json +++ b/CVE-2006/CVE-2006-16xx/CVE-2006-1668.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1668", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-07T10:04:00.000", - "lastModified": "2017-10-19T01:29:05.097", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "Successful exploitation requires privileges to upload images. This product is also known as PHP thumbnail Photo Gallery.", "descriptions": [ @@ -73,16 +73,30 @@ "url": "http://bash-x.net/undef/adv/craftygallery.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://bash-x.net/undef/exploits/crappy_syntax.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://secunia.com/advisories/19478", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/24387", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/17379", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-16xx/CVE-2006-1676.json b/CVE-2006/CVE-2006-16xx/CVE-2006-1676.json index c559ed8e77d..33a77a72419 100644 --- a/CVE-2006/CVE-2006-16xx/CVE-2006-1676.json +++ b/CVE-2006/CVE-2006-16xx/CVE-2006-1676.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1676", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-11T00:02:00.000", - "lastModified": "2018-10-18T16:33:50.767", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,9 +78,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19578", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.maxdev.com/Article592.phtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/430370/100/0/threaded", diff --git a/CVE-2006/CVE-2006-16xx/CVE-2006-1677.json b/CVE-2006/CVE-2006-16xx/CVE-2006-1677.json index 0c5f1273abd..eec1f7a999a 100644 --- a/CVE-2006/CVE-2006-16xx/CVE-2006-1677.json +++ b/CVE-2006/CVE-2006-16xx/CVE-2006-1677.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1677", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-11T00:02:00.000", - "lastModified": "2018-10-18T16:33:51.280", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,9 +78,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19578", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.maxdev.com/Article592.phtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/430370/100/0/threaded", diff --git a/CVE-2006/CVE-2006-16xx/CVE-2006-1688.json b/CVE-2006/CVE-2006-16xx/CVE-2006-1688.json index 7552163da1f..febd4fd564a 100644 --- a/CVE-2006/CVE-2006-16xx/CVE-2006-1688.json +++ b/CVE-2006/CVE-2006-16xx/CVE-2006-1688.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1688", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-11T00:02:00.000", - "lastModified": "2018-10-18T16:33:53.030", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,6 +75,20 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/19482", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19588", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/679", "source": "cve@mitre.org" @@ -89,10 +103,130 @@ { "url": "http://www.blogcu.com/Liz0ziM/431845/", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/24401", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24402", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24403", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24404", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24405", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24406", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24407", + "source": "cve@mitre.org", "tags": [ "Exploit" ] }, + { + "url": "http://www.osvdb.org/24408", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24409", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24410", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24411", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24412", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24413", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24414", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24415", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24416", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24417", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24418", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24419", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24420", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24421", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24422", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24423", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24424", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24425", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24426", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24427", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24428", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/24429", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/430289/100/0/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-17xx/CVE-2006-1747.json b/CVE-2006/CVE-2006-17xx/CVE-2006-1747.json index 448619e9652..433bfa5213c 100644 --- a/CVE-2006/CVE-2006-17xx/CVE-2006-1747.json +++ b/CVE-2006/CVE-2006-17xx/CVE-2006-1747.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1747", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-12T22:02:00.000", - "lastModified": "2018-10-18T16:36:08.863", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,8 @@ "url": "http://www.blogcu.com/Liz0ziM/431925/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1932.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1932.json index 4054adc1c46..4ad98057886 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1932.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1932.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1932", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.233", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -155,6 +155,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -171,7 +207,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1933.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1933.json index f5c6e69081b..ac1035dd6d6 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1933.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1933.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1933", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.313", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -166,7 +202,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1934.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1934.json index 83965ebd2a3..a80423b2830 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1934.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1934.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1934", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.437", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -166,7 +202,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1935.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1935.json index bbe7adf5940..328f7f48778 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1935.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1935.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1935", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.500", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -160,6 +160,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -176,7 +212,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1936.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1936.json index 9c3a0d8308e..b83a5d6db04 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1936.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1936.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1936", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.577", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -160,6 +160,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -176,7 +212,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1937.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1937.json index e5e7bc68cb8..b489f8788f2 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1937.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1937.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1937", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.657", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,69 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -166,7 +229,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1938.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1938.json index c293c8bd086..7973c58be4f 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1938.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1938.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1938", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.733", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -335,6 +335,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -351,7 +387,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1939.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1939.json index be79c9d3edb..ba2c255f689 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1939.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1939.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1939", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.860", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -245,6 +245,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -261,7 +297,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1940.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1940.json index fe652328095..293fa396e18 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1940.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1940.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1940", "sourceIdentifier": "secalert@redhat.com", "published": "2006-04-25T12:50:00.000", - "lastModified": "2017-10-11T01:30:51.920", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -150,6 +150,42 @@ "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/19769", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19805", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19828", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19839", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19958", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/19962", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20117", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20210", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/20944", + "source": "secalert@redhat.com" + }, { "url": "http://securitytracker.com/id?1015985", "source": "secalert@redhat.com" @@ -166,7 +202,8 @@ "url": "http://www.ethereal.com/appnotes/enpa-sa-00023.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1954.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1954.json index 1ca79dfad05..41f27924e78 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1954.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1954.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1954", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-21T10:02:00.000", - "lastModified": "2017-10-19T01:29:06.267", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,13 +71,22 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0384.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/19728", + "source": "cve@mitre.org" + }, { "url": "http://www.g-0.org/code/rz2-adv.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/24752", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/17588", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1955.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1955.json index a454246f795..ccf74921bd4 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1955.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1955.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1955", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-21T10:02:00.000", - "lastModified": "2017-10-19T01:29:06.330", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,13 +71,22 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0384.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/19728", + "source": "cve@mitre.org" + }, { "url": "http://www.g-0.org/code/rz2-adv.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/24753", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/17589", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1956.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1956.json index 93daaceeba7..6e488521bf8 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1956.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1956.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1956", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-21T10:02:00.000", - "lastModified": "2018-10-18T16:37:21.800", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,7 +76,8 @@ "url": "http://irannetjob.com/content/view/209/28/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-19xx/CVE-2006-1957.json b/CVE-2006/CVE-2006-19xx/CVE-2006-1957.json index b98c369ea44..e7f92115179 100644 --- a/CVE-2006/CVE-2006-19xx/CVE-2006-1957.json +++ b/CVE-2006/CVE-2006-19xx/CVE-2006-1957.json @@ -2,7 +2,7 @@ "id": "CVE-2006-1957", "sourceIdentifier": "cve@mitre.org", "published": "2006-04-21T10:02:00.000", - "lastModified": "2018-10-18T16:37:21.957", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,7 +78,10 @@ }, { "url": "http://irannetjob.com/content/view/209/28/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.kapda.ir/advisory-313.html", diff --git a/CVE-2006/CVE-2006-22xx/CVE-2006-2208.json b/CVE-2006/CVE-2006-22xx/CVE-2006-2208.json index b03a02f2ccf..2b519f703f8 100644 --- a/CVE-2006/CVE-2006-22xx/CVE-2006-2208.json +++ b/CVE-2006/CVE-2006-22xx/CVE-2006-2208.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2208", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-05T12:46:00.000", - "lastModified": "2017-07-20T01:31:16.380", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,13 +67,25 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19935", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.cyber-soldiers.org/Dream/mynews.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/25223", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/17823", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-23xx/CVE-2006-2332.json b/CVE-2006/CVE-2006-23xx/CVE-2006-2332.json index 23fb5db71e4..dfc75e79c7a 100644 --- a/CVE-2006/CVE-2006-23xx/CVE-2006-2332.json +++ b/CVE-2006/CVE-2006-23xx/CVE-2006-2332.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2332", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-12T00:02:00.000", - "lastModified": "2018-10-18T16:39:23.350", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,7 +85,10 @@ }, { "url": "http://www.securityview.org/confirmed-bug-in-firefox-1503.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-23xx/CVE-2006-2395.json b/CVE-2006/CVE-2006-23xx/CVE-2006-2395.json index 1a978dc7619..26125c19f26 100644 --- a/CVE-2006/CVE-2006-23xx/CVE-2006-2395.json +++ b/CVE-2006/CVE-2006-23xx/CVE-2006-2395.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2395", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-16T01:02:00.000", - "lastModified": "2017-07-20T01:31:26.350", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ "url": "http://pridels0.blogspot.com/2006/05/popphoto-remote-file-inclusion-vuln.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/20087", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1016092", "source": "cve@mitre.org" @@ -80,9 +87,16 @@ "source": "cve@mitre.org" }, { - "url": "http://www.pixaria.com/news/article/35/", + "url": "http://www.osvdb.org/25524", "source": "cve@mitre.org" }, + { + "url": "http://www.pixaria.com/news/article/35/", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/17970", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-24xx/CVE-2006-2483.json b/CVE-2006/CVE-2006-24xx/CVE-2006-2483.json index 97245dfb97b..6852a183660 100644 --- a/CVE-2006/CVE-2006-24xx/CVE-2006-2483.json +++ b/CVE-2006/CVE-2006-24xx/CVE-2006-2483.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2483", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-19T23:02:00.000", - "lastModified": "2017-10-19T01:29:08.063", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,11 +77,27 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20121", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.ldev.com/forums/showthread.php?p=9976#post9976", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/25523", + "source": "cve@mitre.org", + "tags": [ + "Exploit" ] }, { diff --git a/CVE-2006/CVE-2006-25xx/CVE-2006-2559.json b/CVE-2006/CVE-2006-25xx/CVE-2006-2559.json index 3a3460717a6..9d05e362baa 100644 --- a/CVE-2006/CVE-2006-25xx/CVE-2006-2559.json +++ b/CVE-2006/CVE-2006-25xx/CVE-2006-2559.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2559", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-24T01:02:00.000", - "lastModified": "2017-07-20T01:31:36.100", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,17 +107,31 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20161", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1016134", "source": "cve@mitre.org" }, { "url": "http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityview.org/how-does-the-upnp-flaw-works.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/1909", diff --git a/CVE-2006/CVE-2006-25xx/CVE-2006-2560.json b/CVE-2006/CVE-2006-25xx/CVE-2006-2560.json index fbdab397667..650e6bc3c4d 100644 --- a/CVE-2006/CVE-2006-25xx/CVE-2006-2560.json +++ b/CVE-2006/CVE-2006-25xx/CVE-2006-2560.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2560", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-24T01:02:00.000", - "lastModified": "2013-01-24T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,13 +85,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20183", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityview.org/how-does-the-upnp-flaw-works.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/1912", diff --git a/CVE-2006/CVE-2006-25xx/CVE-2006-2561.json b/CVE-2006/CVE-2006-25xx/CVE-2006-2561.json index 4c767d92564..23e95bbad60 100644 --- a/CVE-2006/CVE-2006-25xx/CVE-2006-2561.json +++ b/CVE-2006/CVE-2006-25xx/CVE-2006-2561.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2561", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-24T01:02:00.000", - "lastModified": "2017-07-20T01:31:36.163", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,13 +67,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20169", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityview.org/how-does-the-upnp-flaw-works.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/1911", diff --git a/CVE-2006/CVE-2006-25xx/CVE-2006-2562.json b/CVE-2006/CVE-2006-25xx/CVE-2006-2562.json index f8f18a387bf..c814bc3687a 100644 --- a/CVE-2006/CVE-2006-25xx/CVE-2006-2562.json +++ b/CVE-2006/CVE-2006-25xx/CVE-2006-2562.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2562", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-24T01:02:00.000", - "lastModified": "2017-07-20T01:31:36.257", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,13 +67,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20184", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityview.org/dutch-student-finds-a-bug-in-upnp.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityview.org/how-does-the-upnp-flaw-works.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/1910", diff --git a/CVE-2006/CVE-2006-29xx/CVE-2006-2979.json b/CVE-2006/CVE-2006-29xx/CVE-2006-2979.json index a3dbfcbb0c6..2838c94ff91 100644 --- a/CVE-2006/CVE-2006-29xx/CVE-2006-2979.json +++ b/CVE-2006/CVE-2006-29xx/CVE-2006-2979.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2979", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-12T22:02:00.000", - "lastModified": "2018-10-18T16:45:03.593", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -67,6 +67,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20538", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1087", "source": "cve@mitre.org" @@ -79,7 +86,8 @@ "url": "http://www.codetosell.com/downloads/xss_fix.zip", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-29xx/CVE-2006-2980.json b/CVE-2006/CVE-2006-29xx/CVE-2006-2980.json index c1dc6df93c1..c719155add7 100644 --- a/CVE-2006/CVE-2006-29xx/CVE-2006-2980.json +++ b/CVE-2006/CVE-2006-29xx/CVE-2006-2980.json @@ -2,7 +2,7 @@ "id": "CVE-2006-2980", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-12T22:02:00.000", - "lastModified": "2017-07-20T01:31:56.727", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,7 +83,10 @@ }, { "url": "http://www.codetosell.com/downloads/xss_fix.zip", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27684", diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3203.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3203.json index 3cb3c73cb0d..ed87f804cb8 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3203.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3203.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3203", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-24T01:06:00.000", - "lastModified": "2018-10-18T16:46:15.487", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3204.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3204.json index 1a803ad6b6e..81988063d21 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3204.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3204.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3204", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-24T01:06:00.000", - "lastModified": "2018-10-18T16:46:15.687", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -94,7 +94,8 @@ "url": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3205.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3205.json index 3eaeb75f0f6..df775415274 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3205.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3205.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3205", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-24T01:06:00.000", - "lastModified": "2018-10-18T16:46:15.890", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -92,7 +92,10 @@ }, { "url": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/437875/100/0/threaded", diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3208.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3208.json index 7ad5b36c08e..a17f9bbc25f 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3208.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3208.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3208", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-24T01:06:00.000", - "lastModified": "2018-10-18T16:46:16.407", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -94,7 +94,8 @@ "url": "http://www.kliconsulting.com/users/mbrooks/UPB_0-day.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3250.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3250.json index 0e437feae43..6ea985b8319 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3250.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3250.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3250", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-27T18:05:00.000", - "lastModified": "2018-10-18T16:46:26.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,8 @@ "url": "http://www.jaascois.com/exploits/18602016/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-32xx/CVE-2006-3264.json b/CVE-2006/CVE-2006-32xx/CVE-2006-3264.json index 406eb9b1507..520587352f4 100644 --- a/CVE-2006/CVE-2006-32xx/CVE-2006-3264.json +++ b/CVE-2006/CVE-2006-32xx/CVE-2006-3264.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3264", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-27T21:05:00.000", - "lastModified": "2018-10-18T16:46:30.517", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20821", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/1156", "source": "cve@mitre.org" @@ -87,7 +91,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-33xx/CVE-2006-3313.json b/CVE-2006/CVE-2006-33xx/CVE-2006-3313.json index aece35930d2..2aafab30915 100644 --- a/CVE-2006/CVE-2006-33xx/CVE-2006-3313.json +++ b/CVE-2006/CVE-2006-33xx/CVE-2006-3313.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3313", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-29T19:05:00.000", - "lastModified": "2018-10-18T16:46:44.140", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,12 +86,16 @@ "url": "http://www.kil13r.info/sa/Kil13r-SA-20060622-1.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://www.kil13r.info/sa/xss/smartnetxss.jpg", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/438164/100/0/threaded", diff --git a/CVE-2006/CVE-2006-33xx/CVE-2006-3344.json b/CVE-2006/CVE-2006-33xx/CVE-2006-3344.json index 8706f59497a..6d01f6c04c0 100644 --- a/CVE-2006/CVE-2006-33xx/CVE-2006-3344.json +++ b/CVE-2006/CVE-2006-33xx/CVE-2006-3344.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3344", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-03T19:05:00.000", - "lastModified": "2018-10-18T16:46:56.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20896", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1183", "source": "cve@mitre.org" @@ -83,7 +90,8 @@ "url": "http://www.digitalarmaments.com/2006290674551938.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-33xx/CVE-2006-3395.json b/CVE-2006/CVE-2006-33xx/CVE-2006-3395.json index 42a9e99bc6e..a252e7ef165 100644 --- a/CVE-2006/CVE-2006-33xx/CVE-2006-3395.json +++ b/CVE-2006/CVE-2006-33xx/CVE-2006-3395.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3395", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-06T20:05:00.000", - "lastModified": "2017-07-20T01:32:17.820", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20923", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1016417", "source": "cve@mitre.org", @@ -80,6 +87,13 @@ }, { "url": "http://www.jaascois.com/exploits/18602017/", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/26959", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-33xx/CVE-2006-3397.json b/CVE-2006/CVE-2006-33xx/CVE-2006-3397.json index 698accd268a..60435af69bd 100644 --- a/CVE-2006/CVE-2006-33xx/CVE-2006-3397.json +++ b/CVE-2006/CVE-2006-33xx/CVE-2006-3397.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3397", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-06T20:05:00.000", - "lastModified": "2017-07-20T01:32:17.927", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20912", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.pkrinternet.com/download/RELEASE-NOTES.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/18818", @@ -97,7 +108,10 @@ }, { "url": "https://www.pkrinternet.com/taskjitsu/task/3313", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-33xx/CVE-2006-3398.json b/CVE-2006/CVE-2006-33xx/CVE-2006-3398.json index 892e97c1f65..ed136e79fe7 100644 --- a/CVE-2006/CVE-2006-33xx/CVE-2006-3398.json +++ b/CVE-2006/CVE-2006-33xx/CVE-2006-3398.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3398", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-06T20:05:00.000", - "lastModified": "2011-03-08T02:38:32.127", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,7 +78,10 @@ "references": [ { "url": "http://www.pkrinternet.com/download/RELEASE-NOTES.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/2660", @@ -86,7 +89,10 @@ }, { "url": "https://www.pkrinternet.com/taskjitsu/task/3400", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-35xx/CVE-2006-3527.json b/CVE-2006/CVE-2006-35xx/CVE-2006-3527.json index baf60bc2ec6..8e40acf3ac5 100644 --- a/CVE-2006/CVE-2006-35xx/CVE-2006-3527.json +++ b/CVE-2006/CVE-2006-35xx/CVE-2006-3527.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3527", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-12T00:05:00.000", - "lastModified": "2017-07-20T01:32:22.383", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21056", + "source": "cve@mitre.org" + }, { "url": "http://securitytracker.com/id?1016447", "source": "cve@mitre.org", @@ -80,6 +84,29 @@ }, { "url": "http://www.jaascois.com/exploits/18602018/", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/27314", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/27315", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/27316", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/27317", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/27318", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-36xx/CVE-2006-3603.json b/CVE-2006/CVE-2006-36xx/CVE-2006-3603.json index 3f72ed0d3be..c4465849094 100644 --- a/CVE-2006/CVE-2006-36xx/CVE-2006-3603.json +++ b/CVE-2006/CVE-2006-36xx/CVE-2006-3603.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3603", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-18T15:37:00.000", - "lastModified": "2018-10-18T16:48:08.393", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20994", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.digitalarmaments.com/2006300687985463.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-36xx/CVE-2006-3604.json b/CVE-2006/CVE-2006-36xx/CVE-2006-3604.json index 0f4c921ec52..8d396455bfb 100644 --- a/CVE-2006/CVE-2006-36xx/CVE-2006-3604.json +++ b/CVE-2006/CVE-2006-36xx/CVE-2006-3604.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3604", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-18T15:37:00.000", - "lastModified": "2018-10-18T16:48:08.923", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,11 +72,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/20994", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.digitalarmaments.com/2006300687985463.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-36xx/CVE-2006-3607.json b/CVE-2006/CVE-2006-36xx/CVE-2006-3607.json index 629081c55d4..3e5f8ed7edd 100644 --- a/CVE-2006/CVE-2006-36xx/CVE-2006-3607.json +++ b/CVE-2006/CVE-2006-36xx/CVE-2006-3607.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3607", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-18T15:46:00.000", - "lastModified": "2018-10-18T16:48:09.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://ellsec.org/print.php?type=N&item_id=141", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-38xx/CVE-2006-3873.json b/CVE-2006/CVE-2006-38xx/CVE-2006-3873.json index d1c896b0579..fb7ca200336 100644 --- a/CVE-2006/CVE-2006-38xx/CVE-2006-3873.json +++ b/CVE-2006/CVE-2006-38xx/CVE-2006-3873.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3873", "sourceIdentifier": "secure@microsoft.com", "published": "2006-09-12T23:07:00.000", - "lastModified": "2018-10-17T21:32:07.377", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -142,9 +142,14 @@ "url": "http://weblog.infoworld.com/techwatch/archives/007870.html", "source": "secure@microsoft.com", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/30834", + "source": "secure@microsoft.com" + }, { "url": "http://www.securityfocus.com/archive/1/445835/100/0/threaded", "source": "secure@microsoft.com" diff --git a/CVE-2006/CVE-2006-39xx/CVE-2006-3907.json b/CVE-2006/CVE-2006-39xx/CVE-2006-3907.json index e76e07d9e40..9888a0a2c7b 100644 --- a/CVE-2006/CVE-2006-39xx/CVE-2006-3907.json +++ b/CVE-2006/CVE-2006-39xx/CVE-2006-3907.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3907", "sourceIdentifier": "cve@mitre.org", "published": "2006-07-27T22:04:00.000", - "lastModified": "2018-10-17T21:32:18.533", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21195", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1292", "source": "cve@mitre.org" @@ -83,7 +90,8 @@ "url": "http://www.digitalarmaments.com/2006310665340982.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-39xx/CVE-2006-3957.json b/CVE-2006/CVE-2006-39xx/CVE-2006-3957.json index 1f54aefda09..4c4457af5b5 100644 --- a/CVE-2006/CVE-2006-39xx/CVE-2006-3957.json +++ b/CVE-2006/CVE-2006-39xx/CVE-2006-3957.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3957", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-01T21:04:00.000", - "lastModified": "2008-09-05T21:08:30.103", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.jaascois.com/exploits/18602020", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-39xx/CVE-2006-3958.json b/CVE-2006/CVE-2006-39xx/CVE-2006-3958.json index 8185fc91c71..0a71712f9d6 100644 --- a/CVE-2006/CVE-2006-39xx/CVE-2006-3958.json +++ b/CVE-2006/CVE-2006-39xx/CVE-2006-3958.json @@ -2,7 +2,7 @@ "id": "CVE-2006-3958", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-01T21:04:00.000", - "lastModified": "2017-07-20T01:32:43.460", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,9 +72,24 @@ ], "references": [ { - "url": "http://www.pkrinternet.com/download/RELEASE-NOTES.txt", + "url": "http://secunia.com/advisories/21242", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/27637", "source": "cve@mitre.org" }, + { + "url": "http://www.pkrinternet.com/download/RELEASE-NOTES.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/19251", "source": "cve@mitre.org" @@ -92,7 +107,10 @@ }, { "url": "https://www.pkrinternet.com/taskjitsu/task/3477", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-40xx/CVE-2006-4020.json b/CVE-2006/CVE-2006-40xx/CVE-2006-4020.json index 6f48f99fce2..a8ebe41fd0b 100644 --- a/CVE-2006/CVE-2006-40xx/CVE-2006-4020.json +++ b/CVE-2006/CVE-2006-40xx/CVE-2006-4020.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4020", "sourceIdentifier": "secalert@redhat.com", "published": "2006-08-08T20:04:00.000", - "lastModified": "2018-10-30T16:25:35.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "A Patch(es) addressing this vulnerability can be found here:\r\nhttp://snaps.php.net/\r\n", "descriptions": [ @@ -422,6 +422,62 @@ "url": "http://rhn.redhat.com/errata/RHSA-2006-0736.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/21403", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21467", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21546", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21608", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21683", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21768", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/21847", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22004", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22039", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22069", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22440", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22487", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/22538", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/23247", + "source": "secalert@redhat.com" + }, { "url": "http://security.gentoo.org/glsa/glsa-200608-28.xml", "source": "secalert@redhat.com" @@ -478,7 +534,8 @@ "url": "http://www.plain-text.info/sscanf_bug.txt", "source": "secalert@redhat.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-40xx/CVE-2006-4021.json b/CVE-2006/CVE-2006-40xx/CVE-2006-4021.json index a1ebfc3375a..2214ad32718 100644 --- a/CVE-2006/CVE-2006-40xx/CVE-2006-4021.json +++ b/CVE-2006/CVE-2006-40xx/CVE-2006-4021.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4021", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-17T21:04:00.000", - "lastModified": "2018-10-17T21:32:58.627", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability will be addressed in the following future product release:\r\nScatterChat, ScatterChat, 2.0", "descriptions": [ @@ -80,14 +80,16 @@ "url": "http://www.scatterchat.com/advisories/2006-01_non_tech.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.scatterchat.com/advisories/2006-01_tech.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-42xx/CVE-2006-4253.json b/CVE-2006/CVE-2006-42xx/CVE-2006-4253.json index a9456c9ce82..10f53663701 100644 --- a/CVE-2006/CVE-2006-42xx/CVE-2006-4253.json +++ b/CVE-2006/CVE-2006-42xx/CVE-2006-4253.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4253", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-21T20:04:00.000", - "lastModified": "2018-10-17T21:34:06.723", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -218,6 +218,148 @@ "url": "http://lcamtuf.coredump.cx/ffoxdie3.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/21513", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21906", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21915", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21916", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21939", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21940", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21949", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21950", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22001", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22025", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22036", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22055", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22056", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/22066", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/22074", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22088", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22195", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/22210", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22274", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22391", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22422", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24711", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-200609-19.xml", "source": "cve@mitre.org" @@ -264,7 +406,10 @@ }, { "url": "http://www.pianetapc.it/view.php?id=770", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html", diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4508.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4508.json index 6b8b2ef3994..a3887f33d5d 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4508.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4508.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4508", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-31T23:04:00.000", - "lastModified": "2017-07-20T01:33:08.663", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulenrability is addressed in the following product release:\r\nTor, Tor, 0.1.1.23, and later\r\nScatterchat, Scatterchat, 1.0.2", "descriptions": [ @@ -276,13 +276,30 @@ ] }, { - "url": "http://www.scatterchat.com/advisories/2006-02_tech.html", + "url": "http://secunia.com/advisories/21708", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/21725", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.scatterchat.com/advisories/2006-02_tech.html", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory", + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/19785", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4523.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4523.json index ec9344747fe..3d1694a59a5 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4523.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4523.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4523", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-01T23:04:00.000", - "lastModified": "2018-10-17T21:37:27.887", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -111,13 +111,23 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21583", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1489", "source": "cve@mitre.org" }, { "url": "http://www.mexhackteam.org/prethoonker/DoS_ADV_2Wire.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/443906/100/100/threaded", diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4532.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4532.json index aed128e2963..445afee6de0 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4532.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4532.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4532", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-01T23:04:00.000", - "lastModified": "2017-10-19T01:29:22.173", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,15 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21680", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1016775", "source": "cve@mitre.org", @@ -87,7 +96,8 @@ "url": "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4554.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4554.json index 031b388cdb9..440b1635344 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4554.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4554.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4554", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-06T00:04:00.000", - "lastModified": "2018-10-17T21:37:36.290", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nBeCubed, Compression Plus, 5.0.1.28", "descriptions": [ @@ -73,13 +73,36 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21714", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/21718", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/21720", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/21750", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/21751", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/1498", "source": "cve@mitre.org" }, { "url": "http://www.becubed.com/downloads/compfix.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.mnin.org/advisories/2006_cp5_tweed.pdf", diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4559.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4559.json index 44ab78d0609..d427e93a5b6 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4559.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4559.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4559", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-06T00:04:00.000", - "lastModified": "2008-09-05T21:10:00.957", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -71,11 +71,61 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21680", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/31301", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31302", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31303", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31304", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31305", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31306", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31307", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31308", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31309", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/31310", + "source": "cve@mitre.org" + }, { "url": "http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] } ] diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4560.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4560.json index aa50d78b123..10fdfae0492 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4560.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4560.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4560", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-06T00:04:00.000", - "lastModified": "2018-10-17T21:37:38.103", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,13 +75,18 @@ "url": "http://polyboy.net/xss/dnsslurp.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://shampoo.antville.org/stories/1451301/", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/31329", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/443209/100/200/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4561.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4561.json index c465c91fae8..56ae943e9cb 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4561.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4561.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4561", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-06T00:04:00.000", - "lastModified": "2018-10-17T21:37:38.370", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,16 @@ } ], "references": [ + { + "url": "http://osvdb.org/31834", + "source": "cve@mitre.org" + }, { "url": "http://polyboy.net/xss/dnsslurp.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-46xx/CVE-2006-4613.json b/CVE-2006/CVE-2006-46xx/CVE-2006-4613.json index 4835c586122..fc1967c6cab 100644 --- a/CVE-2006/CVE-2006-46xx/CVE-2006-4613.json +++ b/CVE-2006/CVE-2006-46xx/CVE-2006-4613.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4613", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-07T00:04:00.000", - "lastModified": "2017-07-20T01:33:12.413", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nSecure Computing, SnapGear, 3.1.4u1", "descriptions": [ @@ -87,11 +87,20 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21707", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.cyberguard.info/snapgear/releases.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-46xx/CVE-2006-4664.json b/CVE-2006/CVE-2006-46xx/CVE-2006-4664.json index 829eea1dc87..464dcd9bd7d 100644 --- a/CVE-2006/CVE-2006-46xx/CVE-2006-4664.json +++ b/CVE-2006/CVE-2006-46xx/CVE-2006-4664.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4664", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-09T00:04:00.000", - "lastModified": "2018-10-17T21:38:57.950", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,7 +76,15 @@ "url": "http://rst-crew.net/premodshadow.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/21803", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-47xx/CVE-2006-4720.json b/CVE-2006/CVE-2006-47xx/CVE-2006-4720.json index dd17cb18004..fbc82f432d4 100644 --- a/CVE-2006/CVE-2006-47xx/CVE-2006-4720.json +++ b/CVE-2006/CVE-2006-47xx/CVE-2006-4720.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4720", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-12T16:07:00.000", - "lastModified": "2018-10-17T21:39:17.777", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21850", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1556", "source": "cve@mitre.org" @@ -84,7 +92,8 @@ "url": "http://www.nyubicrew.org/adv/solpot-adv-06.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-47xx/CVE-2006-4753.json b/CVE-2006/CVE-2006-47xx/CVE-2006-4753.json index 942bd86035f..02c50c90d19 100644 --- a/CVE-2006/CVE-2006-47xx/CVE-2006-4753.json +++ b/CVE-2006/CVE-2006-47xx/CVE-2006-4753.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4753", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-13T22:07:00.000", - "lastModified": "2017-07-20T01:33:17.163", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nComScripts, PHProg, 1.1", "descriptions": [ @@ -76,6 +76,15 @@ "url": "http://marc.info/?l=full-disclosure&m=115796646100433&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/21849", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.comscripts.com/scripts/php.phprog-album-photo-php.2117.html", "source": "cve@mitre.org", @@ -88,7 +97,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-47xx/CVE-2006-4754.json b/CVE-2006/CVE-2006-47xx/CVE-2006-4754.json index 21be30e27a3..88be564fb00 100644 --- a/CVE-2006/CVE-2006-47xx/CVE-2006-4754.json +++ b/CVE-2006/CVE-2006-47xx/CVE-2006-4754.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4754", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-13T22:07:00.000", - "lastModified": "2017-07-20T01:33:17.210", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nComScripts, PHProg, 1.1", "descriptions": [ @@ -76,6 +76,15 @@ "url": "http://marc.info/?l=full-disclosure&m=115796646100433&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/21849", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.comscripts.com/scripts/php.phprog-album-photo-php.2117.html", "source": "cve@mitre.org", @@ -88,7 +97,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-47xx/CVE-2006-4788.json b/CVE-2006/CVE-2006-47xx/CVE-2006-4788.json index 6ee9a9bc806..19ba5d01992 100644 --- a/CVE-2006/CVE-2006-47xx/CVE-2006-4788.json +++ b/CVE-2006/CVE-2006-47xx/CVE-2006-4788.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4788", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-14T10:07:00.000", - "lastModified": "2017-10-19T01:29:25.220", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,9 +82,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21878", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.telekorn.com/forum/showthread.php?t=1427", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/3570", diff --git a/CVE-2006/CVE-2006-48xx/CVE-2006-4834.json b/CVE-2006/CVE-2006-48xx/CVE-2006-4834.json index 330adc40b14..6aa4265857b 100644 --- a/CVE-2006/CVE-2006-48xx/CVE-2006-4834.json +++ b/CVE-2006/CVE-2006-48xx/CVE-2006-4834.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4834", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-15T22:07:00.000", - "lastModified": "2018-10-17T21:39:52.013", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,7 +79,8 @@ "url": "http://www.nyubicrew.org/adv/solpot-adv-07.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-48xx/CVE-2006-4864.json b/CVE-2006/CVE-2006-48xx/CVE-2006-4864.json index 227c3c95dc2..a074f0b13d5 100644 --- a/CVE-2006/CVE-2006-48xx/CVE-2006-4864.json +++ b/CVE-2006/CVE-2006-48xx/CVE-2006-4864.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4864", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-19T18:07:00.000", - "lastModified": "2018-10-17T21:39:59.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21971", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1603", "source": "cve@mitre.org" @@ -79,7 +86,8 @@ "url": "http://www.nyubicrew.org/adv/home_edition2001-adv-01.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-48xx/CVE-2006-4889.json b/CVE-2006/CVE-2006-48xx/CVE-2006-4889.json index 6e47dab22d0..913fbdf40ee 100644 --- a/CVE-2006/CVE-2006-48xx/CVE-2006-4889.json +++ b/CVE-2006/CVE-2006-48xx/CVE-2006-4889.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4889", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-19T21:07:00.000", - "lastModified": "2018-10-17T21:40:09.217", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,86 @@ "url": "http://securityreason.com/securityalert/1619", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/32199", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32200", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32201", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32202", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32203", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32204", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32205", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32206", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32207", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32208", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32209", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32210", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32211", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32212", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32213", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32214", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32215", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32216", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32217", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32218", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/446086/100/0/threaded", "source": "cve@mitre.org" @@ -99,7 +179,10 @@ }, { "url": "http://www.telekorn.com/forum/showthread.php?t=1427", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28888", diff --git a/CVE-2006/CVE-2006-48xx/CVE-2006-4893.json b/CVE-2006/CVE-2006-48xx/CVE-2006-4893.json index f52bb61a506..2511d5a3d27 100644 --- a/CVE-2006/CVE-2006-48xx/CVE-2006-4893.json +++ b/CVE-2006/CVE-2006-48xx/CVE-2006-4893.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4893", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-19T22:07:00.000", - "lastModified": "2018-10-17T21:40:12.200", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,13 +76,25 @@ "url": "http://nyubicrew.org/adv/Noge_adv_02.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/21970", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/1617", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/28918", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/446108/100/0/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-49xx/CVE-2006-4964.json b/CVE-2006/CVE-2006-49xx/CVE-2006-4964.json index 67357c162ea..2b951189c54 100644 --- a/CVE-2006/CVE-2006-49xx/CVE-2006-4964.json +++ b/CVE-2006/CVE-2006-49xx/CVE-2006-4964.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4964", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-23T10:07:00.000", - "lastModified": "2011-03-08T02:42:20.437", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nMAXdev, MDPro, 1.0.76 (patch 20060918)", "descriptions": [ @@ -92,18 +92,28 @@ "url": "http://jvn.jp/jp/JVN%2346630603/index.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/22050", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.maxdev.com/Article605.phtml", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { "url": "http://www.maxdev.com/Downloads-index-req-dldet-lid-497-ttitle-Security_fix_for_MDPro_1.076.phtml", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-49xx/CVE-2006-4966.json b/CVE-2006/CVE-2006-49xx/CVE-2006-4966.json index dea02ca25a1..45c9d4c5885 100644 --- a/CVE-2006/CVE-2006-49xx/CVE-2006-4966.json +++ b/CVE-2006/CVE-2006-49xx/CVE-2006-4966.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4966", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-25T00:07:00.000", - "lastModified": "2018-10-17T21:40:35.670", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22042", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1630", "source": "cve@mitre.org" @@ -79,7 +86,8 @@ "url": "http://www.nyubicrew.org/adv/solpot-adv-08.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-49xx/CVE-2006-4973.json b/CVE-2006/CVE-2006-49xx/CVE-2006-4973.json index 4d75405455f..a625f22920b 100644 --- a/CVE-2006/CVE-2006-49xx/CVE-2006-4973.json +++ b/CVE-2006/CVE-2006-49xx/CVE-2006-4973.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4973", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-25T01:07:00.000", - "lastModified": "2017-07-20T01:33:25.993", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -126,6 +126,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22051", + "source": "cve@mitre.org" + }, { "url": "http://www.dotnetnuke.com/About/WhatIsDotNetNuke/SecurityPolicy/SecurityBulletinno3/tabid/990/Default.aspx", "source": "cve@mitre.org", @@ -140,7 +144,8 @@ "tags": [ "Exploit", "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5043.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5043.json index 67e4699717d..bd11019cc59 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5043.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5043.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5043", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-27T23:07:00.000", - "lastModified": "2023-11-07T01:59:26.377", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -114,7 +114,10 @@ }, { "url": "http://www.howtoria.com/index.php?option=com_docman&task=doc_download&gid=32&Itemid=27", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/23129", diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5088.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5088.json index 98ed1031fe7..2f5b77e2e70 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5088.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5088.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5088", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-29T20:07:00.000", - "lastModified": "2018-10-17T21:41:02.500", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,7 +79,8 @@ "url": "http://www.nyubicrew.org/adv/solpot-adv-09.txt", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5094.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5094.json index 874e6de6fe1..9cbbc19f1b3 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5094.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5094.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5094", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-29T21:07:00.000", - "lastModified": "2018-10-17T21:41:03.420", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22177", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1660", "source": "cve@mitre.org" @@ -80,7 +87,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5097.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5097.json index d6c79b455a1..0dd345ba6a1 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5097.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5097.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5097", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-29T21:07:00.000", - "lastModified": "2023-11-07T01:59:27.323", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,15 +85,24 @@ }, { "url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6676", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6687", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.net2ftp.org/forums/viewtopic.php?pid=6689", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/447156/100/0/threaded", diff --git a/CVE-2006/CVE-2006-51xx/CVE-2006-5154.json b/CVE-2006/CVE-2006-51xx/CVE-2006-5154.json index 376579b7110..f4648c74421 100644 --- a/CVE-2006/CVE-2006-51xx/CVE-2006-5154.json +++ b/CVE-2006/CVE-2006-51xx/CVE-2006-5154.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5154", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-05T04:04:00.000", - "lastModified": "2017-07-20T01:33:34.023", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -96,13 +96,25 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22176", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.deluxebb.com/community/topic.php?tid=420", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/29371", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/20292", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-51xx/CVE-2006-5184.json b/CVE-2006/CVE-2006-51xx/CVE-2006-5184.json index e4013030ddd..79629ef57a7 100644 --- a/CVE-2006/CVE-2006-51xx/CVE-2006-5184.json +++ b/CVE-2006/CVE-2006-51xx/CVE-2006-5184.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5184", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-10T04:06:00.000", - "lastModified": "2011-03-08T02:42:43.923", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nPKR Internet, Taskjitsu, 2.0.6", "descriptions": [ @@ -98,6 +98,14 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22257", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1016978", "source": "cve@mitre.org" @@ -115,13 +123,17 @@ }, { "url": "https://www.pkrinternet.com/download/RELEASE-NOTES.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://www.pkrinternet.com/taskjitsu/task/3517", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] } ] diff --git a/CVE-2006/CVE-2006-52xx/CVE-2006-5236.json b/CVE-2006/CVE-2006-52xx/CVE-2006-5236.json index a29592439e0..b525a7a80cc 100644 --- a/CVE-2006/CVE-2006-52xx/CVE-2006-5236.json +++ b/CVE-2006/CVE-2006-52xx/CVE-2006-5236.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5236", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-11T01:07:00.000", - "lastModified": "2018-10-17T21:41:49.547", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22349", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/1711", "source": "cve@mitre.org" @@ -88,7 +92,8 @@ "url": "http://w4ck1ng.com/board/showthread.php?t=1037", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-52xx/CVE-2006-5237.json b/CVE-2006/CVE-2006-52xx/CVE-2006-5237.json index 1bf7e803b03..4820000d98d 100644 --- a/CVE-2006/CVE-2006-52xx/CVE-2006-5237.json +++ b/CVE-2006/CVE-2006-52xx/CVE-2006-5237.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5237", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-12T00:07:00.000", - "lastModified": "2011-03-08T02:42:49.533", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -132,9 +132,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22310", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.bookmark-manager.com/CHANGES", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/20417", diff --git a/CVE-2006/CVE-2006-52xx/CVE-2006-5238.json b/CVE-2006/CVE-2006-52xx/CVE-2006-5238.json index 9d54b5304de..9d5ec22522e 100644 --- a/CVE-2006/CVE-2006-52xx/CVE-2006-5238.json +++ b/CVE-2006/CVE-2006-52xx/CVE-2006-5238.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5238", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-12T00:07:00.000", - "lastModified": "2011-03-08T02:42:49.627", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -134,6 +134,13 @@ "references": [ { "url": "http://www.bookmark-manager.com/CHANGES", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/29542", "source": "cve@mitre.org" }, { diff --git a/CVE-2006/CVE-2006-54xx/CVE-2006-5447.json b/CVE-2006/CVE-2006-54xx/CVE-2006-5447.json index 6d1e9b74f85..3a5f9cf495a 100644 --- a/CVE-2006/CVE-2006-54xx/CVE-2006-5447.json +++ b/CVE-2006/CVE-2006-54xx/CVE-2006-5447.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5447", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-23T17:07:00.000", - "lastModified": "2018-10-17T21:42:57.063", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -87,7 +87,8 @@ "url": "http://www.x0n3-h4ck.org/index.php?name=news&article=139", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-55xx/CVE-2006-5598.json b/CVE-2006/CVE-2006-55xx/CVE-2006-5598.json index 9f77ef624e0..842ecccba6a 100644 --- a/CVE-2006/CVE-2006-55xx/CVE-2006-5598.json +++ b/CVE-2006/CVE-2006-55xx/CVE-2006-5598.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5598", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-28T01:07:00.000", - "lastModified": "2017-07-20T01:33:51.057", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -99,7 +99,8 @@ "url": "http://webgeneius.com/index.php?mod=blog&id=49", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-57xx/CVE-2006-5759.json b/CVE-2006/CVE-2006-57xx/CVE-2006-5759.json index 080ae04b31a..460abfb9871 100644 --- a/CVE-2006/CVE-2006-57xx/CVE-2006-5759.json +++ b/CVE-2006/CVE-2006-57xx/CVE-2006-5759.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5759", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-06T22:07:00.000", - "lastModified": "2018-10-17T21:44:53.177", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,7 +80,8 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=5", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-57xx/CVE-2006-5761.json b/CVE-2006/CVE-2006-57xx/CVE-2006-5761.json index 5f4f8e0fd66..6cc4974a5e3 100644 --- a/CVE-2006/CVE-2006-57xx/CVE-2006-5761.json +++ b/CVE-2006/CVE-2006-57xx/CVE-2006-5761.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5761", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-06T23:07:00.000", - "lastModified": "2018-10-17T21:44:53.487", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,7 +80,15 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=5", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22715", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-57xx/CVE-2006-5765.json b/CVE-2006/CVE-2006-57xx/CVE-2006-5765.json index 65c8ade465a..17323531593 100644 --- a/CVE-2006/CVE-2006-57xx/CVE-2006-5765.json +++ b/CVE-2006/CVE-2006-57xx/CVE-2006-5765.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5765", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-06T23:07:00.000", - "lastModified": "2017-07-20T01:33:57.353", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22698", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/1826", "source": "cve@mitre.org" @@ -80,7 +87,8 @@ "url": "http://www.blogcu.com/Liz0ziM/1312100", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-58xx/CVE-2006-5810.json b/CVE-2006/CVE-2006-58xx/CVE-2006-5810.json index 741e43e5855..0bafe42e7d8 100644 --- a/CVE-2006/CVE-2006-58xx/CVE-2006-5810.json +++ b/CVE-2006/CVE-2006-58xx/CVE-2006-5810.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5810", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-08T23:07:00.000", - "lastModified": "2008-09-05T21:13:10.540", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -73,7 +73,10 @@ "references": [ { "url": "http://worldphantom.org/foro/index.php?PHPSESS=475e274a8eeb5ffa159e890b2a9cae64&topic=417.new", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/20927", diff --git a/CVE-2006/CVE-2006-58xx/CVE-2006-5840.json b/CVE-2006/CVE-2006-58xx/CVE-2006-5840.json index e93c453a33d..2ba887b45cc 100644 --- a/CVE-2006/CVE-2006-58xx/CVE-2006-5840.json +++ b/CVE-2006/CVE-2006-58xx/CVE-2006-5840.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5840", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-10T02:07:00.000", - "lastModified": "2023-11-07T01:59:41.510", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -89,7 +89,10 @@ }, { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://secunia.com/advisories/22792", diff --git a/CVE-2006/CVE-2006-58xx/CVE-2006-5843.json b/CVE-2006/CVE-2006-58xx/CVE-2006-5843.json index 9919122202f..33dd33b2ea0 100644 --- a/CVE-2006/CVE-2006-58xx/CVE-2006-5843.json +++ b/CVE-2006/CVE-2006-58xx/CVE-2006-5843.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5843", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-10T02:07:00.000", - "lastModified": "2017-07-20T01:34:01.587", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,15 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=9", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22788", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-58xx/CVE-2006-5844.json b/CVE-2006/CVE-2006-58xx/CVE-2006-5844.json index 6ddc5dbcd90..cb80eeed18a 100644 --- a/CVE-2006/CVE-2006-58xx/CVE-2006-5844.json +++ b/CVE-2006/CVE-2006-58xx/CVE-2006-5844.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5844", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-10T02:07:00.000", - "lastModified": "2017-07-20T01:34:01.650", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,7 +79,8 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=9", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-58xx/CVE-2006-5845.json b/CVE-2006/CVE-2006-58xx/CVE-2006-5845.json index 27721938afe..f2103c56dac 100644 --- a/CVE-2006/CVE-2006-58xx/CVE-2006-5845.json +++ b/CVE-2006/CVE-2006-58xx/CVE-2006-5845.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5845", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-10T02:07:00.000", - "lastModified": "2017-07-20T01:34:01.713", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,16 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=9", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22788", + "source": "cve@mitre.org", + "tags": [ + "Permissions Required", + "Third Party Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-58xx/CVE-2006-5889.json b/CVE-2006/CVE-2006-58xx/CVE-2006-5889.json index 4f54a50260c..590dd5463a5 100644 --- a/CVE-2006/CVE-2006-58xx/CVE-2006-5889.json +++ b/CVE-2006/CVE-2006-58xx/CVE-2006-5889.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5889", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-14T22:07:00.000", - "lastModified": "2017-10-19T01:29:42.080", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,16 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22810", + "source": "cve@mitre.org" + }, { "url": "http://www.craigheffner.com/security/exploits/brewblogger1.3.1.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-59xx/CVE-2006-5917.json b/CVE-2006/CVE-2006-59xx/CVE-2006-5917.json index 6cdcfa0205b..bd728edb1ec 100644 --- a/CVE-2006/CVE-2006-59xx/CVE-2006-5917.json +++ b/CVE-2006/CVE-2006-59xx/CVE-2006-5917.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5917", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-15T15:07:00.000", - "lastModified": "2018-10-17T21:45:55.137", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,15 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=10", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22794", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-59xx/CVE-2006-5944.json b/CVE-2006/CVE-2006-59xx/CVE-2006-5944.json index d49ce2e9597..3f08a2f8537 100644 --- a/CVE-2006/CVE-2006-59xx/CVE-2006-5944.json +++ b/CVE-2006/CVE-2006-59xx/CVE-2006-5944.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5944", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-17T00:07:00.000", - "lastModified": "2018-10-17T21:46:03.547", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,14 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=17", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22914", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] diff --git a/CVE-2006/CVE-2006-59xx/CVE-2006-5945.json b/CVE-2006/CVE-2006-59xx/CVE-2006-5945.json index a0344361d7d..b56dd9f039f 100644 --- a/CVE-2006/CVE-2006-59xx/CVE-2006-5945.json +++ b/CVE-2006/CVE-2006-59xx/CVE-2006-5945.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5945", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-17T00:07:00.000", - "lastModified": "2018-10-17T21:46:04.013", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,14 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=17", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22914", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] diff --git a/CVE-2006/CVE-2006-59xx/CVE-2006-5946.json b/CVE-2006/CVE-2006-59xx/CVE-2006-5946.json index 3320bd9fd79..baf584ff362 100644 --- a/CVE-2006/CVE-2006-59xx/CVE-2006-5946.json +++ b/CVE-2006/CVE-2006-59xx/CVE-2006-5946.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5946", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-17T00:07:00.000", - "lastModified": "2018-10-17T21:46:04.560", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,14 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=19", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22911", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] diff --git a/CVE-2006/CVE-2006-59xx/CVE-2006-5953.json b/CVE-2006/CVE-2006-59xx/CVE-2006-5953.json index acfb506398c..c562a23aacb 100644 --- a/CVE-2006/CVE-2006-59xx/CVE-2006-5953.json +++ b/CVE-2006/CVE-2006-59xx/CVE-2006-5953.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5953", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-17T00:07:00.000", - "lastModified": "2018-10-17T21:46:05.390", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22912", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, diff --git a/CVE-2006/CVE-2006-59xx/CVE-2006-5969.json b/CVE-2006/CVE-2006-59xx/CVE-2006-5969.json index 25907d54e80..91e9eb6ce6b 100644 --- a/CVE-2006/CVE-2006-59xx/CVE-2006-5969.json +++ b/CVE-2006/CVE-2006-59xx/CVE-2006-5969.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5969", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-17T23:07:00.000", - "lastModified": "2017-07-20T01:34:07.103", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,13 +79,24 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22961", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/23089", + "source": "cve@mitre.org" + }, { "url": "http://thread.gmane.org/gmane.comp.window-managers.fvwm.devel/2419/focus=2419", "source": "cve@mitre.org" }, { "url": "http://www.gentoo-portage.com/x11-wm/fvwm/ChangeLog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-17.xml", diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6019.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6019.json index 301abebdbf0..ec7b08521f8 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6019.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6019.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6019", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-21T23:07:00.000", - "lastModified": "2023-11-07T01:59:46.373", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -84,7 +84,10 @@ }, { "url": "http://www.xmors.com/forum/index.php?topic=1175.msg5782%3Btopicsen", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30326", diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6028.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6028.json index acaa4e0e8d8..f4ea45e1244 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6028.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6028.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6028", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-21T23:07:00.000", - "lastModified": "2017-10-19T01:29:43.427", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,16 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22960", + "source": "cve@mitre.org" + }, { "url": "http://www.craigheffner.com/security/exploits/dosepa.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6066.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6066.json index 397c5cbdf2f..99564e2611b 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6066.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6066.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6066", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-22T02:07:00.000", - "lastModified": "2018-10-17T21:46:23.920", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,29 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22930", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/30443", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/30444", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/30445", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/451632/100/100/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6067.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6067.json index c8875940a8e..c6a374fc333 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6067.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6067.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6067", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-22T02:07:00.000", - "lastModified": "2018-10-17T21:46:24.280", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,7 +76,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6074.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6074.json index b7f9d7297db..9619000293a 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6074.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6074.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6074", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T17:07:00.000", - "lastModified": "2018-10-17T21:46:25.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,15 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=21", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22955", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6082.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6082.json index a619b9dd836..5ce3d9a316f 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6082.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6082.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6082", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:33.123", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,15 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=54", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23067", + "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6083.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6083.json index 45c6d263297..e95bffbb394 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6083.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6083.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6083", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:33.467", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,15 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=54", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23067", + "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6084.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6084.json index fcedd245b12..89a80cbd650 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6084.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6084.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6084", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:34.017", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,15 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=52", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23055", + "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6089.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6089.json index 6c1cb086282..10a9ecb8fde 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6089.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6089.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6089", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:35.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,14 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=35", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22943", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6090.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6090.json index 219ad936245..c626dd19df4 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6090.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6090.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6090", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:35.407", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22943", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6092.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6092.json index 7c7c5af2667..f1c8fd8c7db 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6092.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6092.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6092", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:35.767", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,17 @@ "references": [ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=38", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22974", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/1916", diff --git a/CVE-2006/CVE-2006-60xx/CVE-2006-6094.json b/CVE-2006/CVE-2006-60xx/CVE-2006-6094.json index 5b1b455ecc6..46f630728f2 100644 --- a/CVE-2006/CVE-2006-60xx/CVE-2006-6094.json +++ b/CVE-2006/CVE-2006-60xx/CVE-2006-6094.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6094", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-24T18:07:00.000", - "lastModified": "2018-10-17T21:46:36.063", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -84,6 +84,14 @@ "tags": [ "Broken Link", "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22981", + "source": "cve@mitre.org", + "tags": [ "Vendor Advisory" ] }, @@ -101,6 +109,27 @@ "Broken Link" ] }, + { + "url": "http://www.osvdb.org/30518", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/30519", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/30520", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/archive/1/451884/100/100/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-61xx/CVE-2006-6109.json b/CVE-2006/CVE-2006-61xx/CVE-2006-6109.json index 3efdc5c041f..71bc11efae5 100644 --- a/CVE-2006/CVE-2006-61xx/CVE-2006-6109.json +++ b/CVE-2006/CVE-2006-61xx/CVE-2006-6109.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6109", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-26T22:07:00.000", - "lastModified": "2017-07-20T01:34:13.150", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,15 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=25", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22954", + "source": "cve@mitre.org", + "tags": [ + "Exploit" ] }, { diff --git a/CVE-2006/CVE-2006-61xx/CVE-2006-6111.json b/CVE-2006/CVE-2006-61xx/CVE-2006-6111.json index 38ca9863102..e7a650ddf16 100644 --- a/CVE-2006/CVE-2006-61xx/CVE-2006-6111.json +++ b/CVE-2006/CVE-2006-61xx/CVE-2006-6111.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6111", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-26T22:07:00.000", - "lastModified": "2018-10-17T21:46:46.280", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,9 +80,18 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=27", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/32750", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32751", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/451594/100/100/threaded", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-61xx/CVE-2006-6132.json b/CVE-2006/CVE-2006-61xx/CVE-2006-6132.json index 76914f02936..dd9e8a7181e 100644 --- a/CVE-2006/CVE-2006-61xx/CVE-2006-6132.json +++ b/CVE-2006/CVE-2006-61xx/CVE-2006-6132.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6132", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-28T01:07:00.000", - "lastModified": "2018-10-17T21:46:50.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,15 @@ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=53", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23068", + "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" diff --git a/CVE-2006/CVE-2006-61xx/CVE-2006-6152.json b/CVE-2006/CVE-2006-61xx/CVE-2006-6152.json index 5584eb500de..8a061cb0086 100644 --- a/CVE-2006/CVE-2006-61xx/CVE-2006-6152.json +++ b/CVE-2006/CVE-2006-61xx/CVE-2006-6152.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6152", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-28T23:28:00.000", - "lastModified": "2018-10-17T21:46:57.737", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,17 @@ "references": [ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=47", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22987", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/1926", diff --git a/CVE-2006/CVE-2006-61xx/CVE-2006-6153.json b/CVE-2006/CVE-2006-61xx/CVE-2006-6153.json index 8f57b1634ad..dce8f62ea00 100644 --- a/CVE-2006/CVE-2006-61xx/CVE-2006-6153.json +++ b/CVE-2006/CVE-2006-61xx/CVE-2006-6153.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6153", "sourceIdentifier": "cve@mitre.org", "published": "2006-11-28T23:28:00.000", - "lastModified": "2018-10-17T21:46:58.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,17 @@ "references": [ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=47", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22987", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/1926", diff --git a/CVE-2006/CVE-2006-62xx/CVE-2006-6204.json b/CVE-2006/CVE-2006-62xx/CVE-2006-6204.json index d3de5fcea23..b971f5cde86 100644 --- a/CVE-2006/CVE-2006-62xx/CVE-2006-6204.json +++ b/CVE-2006/CVE-2006-62xx/CVE-2006-6204.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6204", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-01T01:28:00.000", - "lastModified": "2018-10-17T21:47:13.377", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,17 @@ "references": [ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=50", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23016", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/1942", diff --git a/CVE-2006/CVE-2006-62xx/CVE-2006-6205.json b/CVE-2006/CVE-2006-62xx/CVE-2006-6205.json index 5854ff734b6..81d109f2c2a 100644 --- a/CVE-2006/CVE-2006-62xx/CVE-2006-6205.json +++ b/CVE-2006/CVE-2006-62xx/CVE-2006-6205.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6205", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-01T01:28:00.000", - "lastModified": "2018-10-17T21:47:13.830", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,17 @@ "references": [ { "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=50", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23016", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/1942", diff --git a/CVE-2006/CVE-2006-62xx/CVE-2006-6208.json b/CVE-2006/CVE-2006-62xx/CVE-2006-6208.json index 51b6166ba84..32104cc34ee 100644 --- a/CVE-2006/CVE-2006-62xx/CVE-2006-6208.json +++ b/CVE-2006/CVE-2006-62xx/CVE-2006-6208.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6208", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-01T01:28:00.000", - "lastModified": "2018-10-17T21:47:15.187", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,15 @@ "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=46", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23050", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-64xx/CVE-2006-6463.json b/CVE-2006/CVE-2006-64xx/CVE-2006-6463.json index 04f001c0cf7..89f7d0aeb23 100644 --- a/CVE-2006/CVE-2006-64xx/CVE-2006-6463.json +++ b/CVE-2006/CVE-2006-64xx/CVE-2006-6463.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6463", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-11T18:28:00.000", - "lastModified": "2018-10-17T21:48:15.753", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,17 @@ } ], "references": [ + { + "url": "http://cupu.us/adv/15-iFX-2006-adv-midicart-phpbackdoor.txt", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23296", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/2016", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-64xx/CVE-2006-6464.json b/CVE-2006/CVE-2006-64xx/CVE-2006-6464.json index 8d9c6334b73..64e66e18318 100644 --- a/CVE-2006/CVE-2006-64xx/CVE-2006-6464.json +++ b/CVE-2006/CVE-2006-64xx/CVE-2006-6464.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6464", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-11T18:28:00.000", - "lastModified": "2018-10-17T21:48:16.067", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorImpact": "Not really a loss of a computer resource, but more like a form of stealing.", "descriptions": [ @@ -77,9 +77,14 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch" + "Patch", + "URL Repurposed" ] }, + { + "url": "http://secunia.com/advisories/23296", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/2016", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-67xx/CVE-2006-6712.json b/CVE-2006/CVE-2006-67xx/CVE-2006-6712.json index 31f8ff5b771..18fd4583bd4 100644 --- a/CVE-2006/CVE-2006-67xx/CVE-2006-6712.json +++ b/CVE-2006/CVE-2006-67xx/CVE-2006-6712.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6712", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-23T01:28:00.000", - "lastModified": "2011-03-08T02:46:50.080", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,12 +74,23 @@ "references": [ { "url": "http://dl.sugarforge.org/sugardocs/Notes/ReleaseNotes/SugarOpenSource_ReleaseNotes_4.5.0g.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://jvn.jp/jp/JVN%2374079537/index.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/23424", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1017434", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-67xx/CVE-2006-6740.json b/CVE-2006/CVE-2006-67xx/CVE-2006-6740.json index 653d04493fc..efdfaa055fa 100644 --- a/CVE-2006/CVE-2006-67xx/CVE-2006-6740.json +++ b/CVE-2006/CVE-2006-67xx/CVE-2006-6740.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6740", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-26T23:28:00.000", - "lastModified": "2017-10-19T01:29:50.723", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "Successful exploitation requires that \"register_globals\" is enabled.", "descriptions": [ @@ -80,12 +80,78 @@ "references": [ { "url": "http://linuxwebshop.com/forum/viewtopic.php?t=40", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/23423", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.attrition.org/pipermail/vim/2007-March/001401.html", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/32363", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32364", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32365", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32366", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32367", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32368", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32369", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32370", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32371", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32372", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32373", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32374", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32375", + "source": "cve@mitre.org" + }, + { + "url": "http://www.osvdb.org/32376", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/21667", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-68xx/CVE-2006-6838.json b/CVE-2006/CVE-2006-68xx/CVE-2006-6838.json index bf095681116..39b9b9d76a5 100644 --- a/CVE-2006/CVE-2006-68xx/CVE-2006-6838.json +++ b/CVE-2006/CVE-2006-68xx/CVE-2006-6838.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6838", "sourceIdentifier": "cve@mitre.org", "published": "2006-12-31T05:00:00.000", - "lastModified": "2018-10-17T21:49:46.727", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,7 +79,8 @@ "url": "http://www.infogreg.com/security/misc/rediff-bol-downloader-allows-downloading-and-spawning-arbitary-files.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-69xx/CVE-2006-6929.json b/CVE-2006/CVE-2006-69xx/CVE-2006-6929.json index 6cfdcb1d422..818212e350e 100644 --- a/CVE-2006/CVE-2006-69xx/CVE-2006-6929.json +++ b/CVE-2006/CVE-2006-69xx/CVE-2006-6929.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6929", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-13T02:28:00.000", - "lastModified": "2018-10-16T16:29:06.803", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,20 @@ } ], "references": [ + { + "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=44", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22985", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/2142", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-69xx/CVE-2006-6930.json b/CVE-2006/CVE-2006-69xx/CVE-2006-6930.json index e75a2b9dc43..fa475633c9f 100644 --- a/CVE-2006/CVE-2006-69xx/CVE-2006-6930.json +++ b/CVE-2006/CVE-2006-69xx/CVE-2006-6930.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6930", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-13T02:28:00.000", - "lastModified": "2018-10-16T16:29:07.303", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,20 @@ } ], "references": [ + { + "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=44", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22985", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/2142", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-69xx/CVE-2006-6934.json b/CVE-2006/CVE-2006-69xx/CVE-2006-6934.json index 05595b17a96..fc210d828d4 100644 --- a/CVE-2006/CVE-2006-69xx/CVE-2006-6934.json +++ b/CVE-2006/CVE-2006-69xx/CVE-2006-6934.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6934", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-16T23:28:00.000", - "lastModified": "2018-10-16T16:29:07.977", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,17 @@ } ], "references": [ + { + "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=8", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22795", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/2150", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-69xx/CVE-2006-6935.json b/CVE-2006/CVE-2006-69xx/CVE-2006-6935.json index 7d329cb9855..6ab109191a5 100644 --- a/CVE-2006/CVE-2006-69xx/CVE-2006-6935.json +++ b/CVE-2006/CVE-2006-69xx/CVE-2006-6935.json @@ -2,7 +2,7 @@ "id": "CVE-2006-6935", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-16T23:28:00.000", - "lastModified": "2018-10-16T16:29:08.397", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=8", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://securityreason.com/securityalert/2150", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-70xx/CVE-2006-7006.json b/CVE-2006/CVE-2006-70xx/CVE-2006-7006.json index 77386274a6d..30c5fd15c30 100644 --- a/CVE-2006/CVE-2006-70xx/CVE-2006-7006.json +++ b/CVE-2006/CVE-2006-70xx/CVE-2006-7006.json @@ -2,7 +2,7 @@ "id": "CVE-2006-7006", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-12T23:28:00.000", - "lastModified": "2023-11-07T01:59:56.860", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -91,7 +91,8 @@ "url": "http://www.root-security.org/danger/Somery.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2006/CVE-2006-70xx/CVE-2006-7092.json b/CVE-2006/CVE-2006-70xx/CVE-2006-7092.json index 5817ab8bfc9..833cda202de 100644 --- a/CVE-2006/CVE-2006-70xx/CVE-2006-7092.json +++ b/CVE-2006/CVE-2006-70xx/CVE-2006-7092.json @@ -2,7 +2,7 @@ "id": "CVE-2006-7092", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-02T21:18:00.000", - "lastModified": "2011-03-08T02:47:51.220", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,7 +76,16 @@ "url": "http://mamboxchange.com/forum/forum.php?forum_id=7767", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22263", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-70xx/CVE-2006-7093.json b/CVE-2006/CVE-2006-70xx/CVE-2006-7093.json index dda3ce3bfe2..6a09f13ff62 100644 --- a/CVE-2006/CVE-2006-70xx/CVE-2006-7093.json +++ b/CVE-2006/CVE-2006-70xx/CVE-2006-7093.json @@ -2,7 +2,7 @@ "id": "CVE-2006-7093", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-02T21:18:00.000", - "lastModified": "2011-03-08T02:47:51.313", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,16 @@ "url": "http://mamboxchange.com/forum/forum.php?forum_id=7767", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/22263", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2006/CVE-2006-71xx/CVE-2006-7103.json b/CVE-2006/CVE-2006-71xx/CVE-2006-7103.json index 8e5c3771735..73509f6d2ef 100644 --- a/CVE-2006/CVE-2006-71xx/CVE-2006-7103.json +++ b/CVE-2006/CVE-2006-71xx/CVE-2006-7103.json @@ -2,7 +2,7 @@ "id": "CVE-2006-7103", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-03T21:19:00.000", - "lastModified": "2018-10-16T16:29:26.553", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -101,7 +101,10 @@ }, { "url": "http://www.ezonlinegallery.com/changelog.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.mayhemiclabs.com/advisories/MHL-2006-003.txt", diff --git a/CVE-2006/CVE-2006-71xx/CVE-2006-7133.json b/CVE-2006/CVE-2006-71xx/CVE-2006-7133.json index 2fbb28db8a2..eba3d9fd3d8 100644 --- a/CVE-2006/CVE-2006-71xx/CVE-2006-7133.json +++ b/CVE-2006/CVE-2006-71xx/CVE-2006-7133.json @@ -2,7 +2,7 @@ "id": "CVE-2006-7133", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-06T01:19:00.000", - "lastModified": "2017-07-29T01:29:51.687", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,16 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/22973", + "source": "cve@mitre.org" + }, { "url": "http://www.craigheffner.com/security/exploits/upload_tool_php.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-02xx/CVE-2007-0253.json b/CVE-2007/CVE-2007-02xx/CVE-2007-0253.json index 8bd8fb6eacd..b8b399b0a4e 100644 --- a/CVE-2007/CVE-2007-02xx/CVE-2007-0253.json +++ b/CVE-2007/CVE-2007-02xx/CVE-2007-0253.json @@ -2,7 +2,7 @@ "id": "CVE-2007-0253", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-16T23:28:00.000", - "lastModified": "2023-11-07T02:00:05.403", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,8 @@ "url": "http://www.digitalarmaments.com/news_news.shtml", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2007/CVE-2007-02xx/CVE-2007-0257.json b/CVE-2007/CVE-2007-02xx/CVE-2007-0257.json index 4fd588adf11..52899a1cc3c 100644 --- a/CVE-2007/CVE-2007-02xx/CVE-2007-0257.json +++ b/CVE-2007/CVE-2007-02xx/CVE-2007-0257.json @@ -2,7 +2,7 @@ "id": "CVE-2007-0257", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-16T23:28:00.000", - "lastModified": "2023-11-07T02:00:05.480", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -153,14 +153,16 @@ "url": "http://www.digitalarmaments.com/news_news.shtml", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.digitalarmaments.com/pre2007-00018659.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-03xx/CVE-2007-0354.json b/CVE-2007/CVE-2007-03xx/CVE-2007-0354.json index e60b918c2c7..4b078c7e7bd 100644 --- a/CVE-2007/CVE-2007-03xx/CVE-2007-0354.json +++ b/CVE-2007/CVE-2007-03xx/CVE-2007-0354.json @@ -2,7 +2,7 @@ "id": "CVE-2007-0354", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-19T01:28:00.000", - "lastModified": "2017-10-19T01:29:58.957", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,14 @@ } ], "references": [ + { + "url": "http://osvdb.org/31612", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/23825", + "source": "cve@mitre.org" + }, { "url": "http://www.attrition.org/pipermail/vim/2007-January/001246.html", "source": "cve@mitre.org" @@ -85,7 +93,10 @@ }, { "url": "http://www.tv-kritik.net/mgb/index.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/0232", diff --git a/CVE-2007/CVE-2007-04xx/CVE-2007-0436.json b/CVE-2007/CVE-2007-04xx/CVE-2007-0436.json index 4a550540a9f..b1918c9286f 100644 --- a/CVE-2007/CVE-2007-04xx/CVE-2007-0436.json +++ b/CVE-2007/CVE-2007-04xx/CVE-2007-0436.json @@ -2,7 +2,7 @@ "id": "CVE-2007-0436", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-04T00:28:00.000", - "lastModified": "2011-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,13 +90,27 @@ "url": "http://jvn.jp/niscc/NISCC-462660/index.html", "source": "cve@mitre.org" }, + { + "url": "http://osvdb.org/33110", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/24045", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.barronmccann.com/ISec/s2pressrelease.asp?PRID=141&S2ID=14", "source": "cve@mitre.org" }, { "url": "http://www.bemacpromotions.com/files/xkpatch462660.zip", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.cpni.gov.uk/Products/advisories/default.aspx?id=al-20070129-0107.xml", diff --git a/CVE-2007/CVE-2007-07xx/CVE-2007-0789.json b/CVE-2007/CVE-2007-07xx/CVE-2007-0789.json index 4c2ae291f90..24149e33bd8 100644 --- a/CVE-2007/CVE-2007-07xx/CVE-2007-0789.json +++ b/CVE-2007/CVE-2007-07xx/CVE-2007-0789.json @@ -2,7 +2,7 @@ "id": "CVE-2007-0789", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-06T19:28:00.000", - "lastModified": "2011-08-05T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,6 +72,24 @@ } ], "references": [ + { + "url": "http://mamboxchange.com/frs/shownotes.php?release_id=6232", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/33088", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/24044", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.vupen.com/english/advisories/2007/0480", "source": "cve@mitre.org", diff --git a/CVE-2007/CVE-2007-08xx/CVE-2007-0811.json b/CVE-2007/CVE-2007-08xx/CVE-2007-0811.json index 64b42545f09..1ce4c3871e0 100644 --- a/CVE-2007/CVE-2007-08xx/CVE-2007-0811.json +++ b/CVE-2007/CVE-2007-08xx/CVE-2007-0811.json @@ -2,7 +2,7 @@ "id": "CVE-2007-0811", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-07T11:28:00.000", - "lastModified": "2017-10-19T01:30:05.190", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,11 +76,16 @@ } ], "references": [ + { + "url": "http://osvdb.org/37636", + "source": "cve@mitre.org" + }, { "url": "http://www.powerhacker.net/exploit/IE_NULL_CRASH.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-08xx/CVE-2007-0882.json b/CVE-2007/CVE-2007-08xx/CVE-2007-0882.json index cc7ca8d9ca6..54240497078 100644 --- a/CVE-2007/CVE-2007-08xx/CVE-2007-0882.json +++ b/CVE-2007/CVE-2007-08xx/CVE-2007-0882.json @@ -2,8 +2,8 @@ "id": "CVE-2007-0882", "sourceIdentifier": "cve@mitre.org", "published": "2007-02-12T20:28:00.000", - "lastModified": "2018-10-30T16:25:11.920", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T14:56:03.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-88" } ] } @@ -62,13 +62,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", - "matchCriteriaId": "7BF232A9-9E0A-481E-918D-65FC82EF36D8" + "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", + "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*", - "matchCriteriaId": "0C0C3793-E011-4915-8F86-CE622A2D37D1" + "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", + "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD" }, { "vulnerable": true, @@ -88,63 +88,136 @@ "references": [ { "url": "http://erratasec.blogspot.com/2007/02/trivial-remote-solaris-0day-disable.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://isc.sans.org/diary.html?storyid=2220", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/31881", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://seclists.org/fulldisclosure/2007/Feb/0217.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/24120", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/881872", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/archive/1/459831/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/459843/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/459855/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/459980/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/460086/100/100/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/460103/100/100/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/22512", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1017625", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA07-059A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, @@ -152,16 +225,24 @@ "url": "http://www.vupen.com/english/advisories/2007/0560", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32434", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2202", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-13xx/CVE-2007-1302.json b/CVE-2007/CVE-2007-13xx/CVE-2007-1302.json index 79dc3432e1d..b95bd689829 100644 --- a/CVE-2007/CVE-2007-13xx/CVE-2007-1302.json +++ b/CVE-2007/CVE-2007-13xx/CVE-2007-1302.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1302", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-07T00:19:00.000", - "lastModified": "2018-10-16T16:37:52.830", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorImpact": "Successful exploitation requires \"magic_quotes_gpc\" to be disabled.", "descriptions": [ @@ -80,6 +80,14 @@ { "url": "http://belsec.com/advisories/139/summary.html", "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/27650", + "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] @@ -90,7 +98,10 @@ }, { "url": "http://www.security-news.ws/li-sql-injection", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/461912/100/0/threaded", diff --git a/CVE-2007/CVE-2007-13xx/CVE-2007-1304.json b/CVE-2007/CVE-2007-13xx/CVE-2007-1304.json index dc3fe527ace..85e63fe9af5 100644 --- a/CVE-2007/CVE-2007-13xx/CVE-2007-1304.json +++ b/CVE-2007/CVE-2007-13xx/CVE-2007-1304.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1304", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-07T00:19:00.000", - "lastModified": "2018-10-16T16:37:53.940", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorImpact": "Successful exploitation requires that \"magic_quotes_gpc\" is disabled.", "descriptions": [ @@ -74,6 +74,13 @@ "references": [ { "url": "http://belsec.com/advisories/142/summary.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/24411", "source": "cve@mitre.org" }, { diff --git a/CVE-2007/CVE-2007-13xx/CVE-2007-1305.json b/CVE-2007/CVE-2007-13xx/CVE-2007-1305.json index 32158561cf0..02e32d535cb 100644 --- a/CVE-2007/CVE-2007-13xx/CVE-2007-1305.json +++ b/CVE-2007/CVE-2007-13xx/CVE-2007-1305.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1305", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-07T00:19:00.000", - "lastModified": "2018-10-16T16:37:54.330", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,6 +73,13 @@ "references": [ { "url": "http://belsec.com/advisories/142/summary.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/24411", "source": "cve@mitre.org" }, { diff --git a/CVE-2007/CVE-2007-13xx/CVE-2007-1324.json b/CVE-2007/CVE-2007-13xx/CVE-2007-1324.json index 87a17c5e3d1..ca3e1e02a82 100644 --- a/CVE-2007/CVE-2007-13xx/CVE-2007-1324.json +++ b/CVE-2007/CVE-2007-13xx/CVE-2007-1324.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1324", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-07T21:19:00.000", - "lastModified": "2017-07-29T01:30:44.140", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -276,12 +276,21 @@ } ], "references": [ + { + "url": "http://osvdb.org/33864", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/24388", + "source": "cve@mitre.org" + }, { "url": "http://www.cyberguard.info/snapgear/releases.html", "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-15xx/CVE-2007-1519.json b/CVE-2007/CVE-2007-15xx/CVE-2007-1519.json index 8c0a8f922bf..4be9bb4d6a7 100644 --- a/CVE-2007/CVE-2007-15xx/CVE-2007-1519.json +++ b/CVE-2007/CVE-2007-15xx/CVE-2007-1519.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1519", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-20T20:19:00.000", - "lastModified": "2018-10-16T16:38:53.410", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,14 @@ "url": "http://phpfi.com/214668", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, + { + "url": "http://secunia.com/advisories/24629", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/archive/1/462308/100/100/threaded", "source": "cve@mitre.org" diff --git a/CVE-2007/CVE-2007-15xx/CVE-2007-1520.json b/CVE-2007/CVE-2007-15xx/CVE-2007-1520.json index 653a1db279d..2a158ddbfa1 100644 --- a/CVE-2007/CVE-2007-15xx/CVE-2007-1520.json +++ b/CVE-2007/CVE-2007-15xx/CVE-2007-1520.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1520", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-20T20:19:00.000", - "lastModified": "2018-10-16T16:38:53.737", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -132,11 +132,23 @@ } ], "references": [ + { + "url": "http://osvdb.org/34501", + "source": "cve@mitre.org" + }, { "url": "http://phpfi.com/214668", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/24629", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2007/CVE-2007-16xx/CVE-2007-1654.json b/CVE-2007/CVE-2007-16xx/CVE-2007-1654.json index 04ba9603998..8d04fd1ecfe 100644 --- a/CVE-2007/CVE-2007-16xx/CVE-2007-1654.json +++ b/CVE-2007/CVE-2007-16xx/CVE-2007-1654.json @@ -2,7 +2,7 @@ "id": "CVE-2007-1654", "sourceIdentifier": "cve@mitre.org", "published": "2007-03-24T00:19:00.000", - "lastModified": "2017-07-29T01:30:53.440", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -93,6 +93,13 @@ "references": [ { "url": "http://netsieben.com/files/CHANGELOG", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/43555", "source": "cve@mitre.org" }, { diff --git a/CVE-2007/CVE-2007-21xx/CVE-2007-2190.json b/CVE-2007/CVE-2007-21xx/CVE-2007-2190.json index 43cef056989..d5829a0a59a 100644 --- a/CVE-2007/CVE-2007-21xx/CVE-2007-2190.json +++ b/CVE-2007/CVE-2007-21xx/CVE-2007-2190.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2190", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-24T17:19:00.000", - "lastModified": "2018-10-16T16:42:26.803", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,7 +76,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2376.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2376.json index 29a2cd4e384..22613aec4cf 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2376.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2376.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2376", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:39.387", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43323", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2377.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2377.json index 2978050e482..c129587050a 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2377.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2377.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2377", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2009-02-20T06:21:08.547", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,8 +76,15 @@ "source": "cve@mitre.org" }, { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43322", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2378.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2378.json index d42be4e5903..b048a6dffaa 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2378.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2378.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2378", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:39.807", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43321", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2379.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2379.json index d8a8e9e3d4f..d55c631be28 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2379.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2379.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2379", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2021-03-31T16:06:56.260", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,11 +86,19 @@ } ], "references": [ + { + "url": "http://osvdb.org/43320", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2380.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2380.json index b709666ea1e..5dcaa896a77 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2380.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2380.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2380", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:40.197", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43325", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2381.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2381.json index a16c63b239c..ed8885a5cc6 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2381.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2381.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2381", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:40.433", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43326", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2382.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2382.json index bbf816784fb..28399f71920 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2382.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2382.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2382", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:40.557", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43327", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2383.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2383.json index 85cd562fadd..f12217f4541 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2383.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2383.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2383", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2009-12-23T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,13 +79,20 @@ "url": "http://prototypejs.org/2007/4/24/release-candidate-3", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/37677", + "source": "cve@mitre.org" + }, { "url": "http://www.debian.org/security/2009/dsa-1952", "source": "cve@mitre.org" }, { "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2384.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2384.json index 89fe3c9d0f7..88315e12c92 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2384.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2384.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2384", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:40.977", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43319", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-23xx/CVE-2007-2385.json b/CVE-2007/CVE-2007-23xx/CVE-2007-2385.json index 7dbe24871e8..e94f4ee8bcb 100644 --- a/CVE-2007/CVE-2007-23xx/CVE-2007-2385.json +++ b/CVE-2007/CVE-2007-23xx/CVE-2007-2385.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2385", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-30T23:19:00.000", - "lastModified": "2008-11-13T06:38:41.183", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,8 +72,15 @@ ], "references": [ { - "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "url": "http://osvdb.org/43324", "source": "cve@mitre.org" + }, + { + "url": "http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-24xx/CVE-2007-2457.json b/CVE-2007/CVE-2007-24xx/CVE-2007-2457.json index ce24a336e2c..a747ae7f87d 100644 --- a/CVE-2007/CVE-2007-24xx/CVE-2007-2457.json +++ b/CVE-2007/CVE-2007-24xx/CVE-2007-2457.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2457", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-02T18:19:00.000", - "lastModified": "2018-10-16T16:44:09.650", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -172,18 +172,36 @@ ], "references": [ { - "url": "http://pixaria.com/index.history.php", + "url": "http://osvdb.org/34976", "source": "cve@mitre.org" }, + { + "url": "http://pixaria.com/index.history.php", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/24821", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.pixaria.com/news/article/70/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.pixaria.com/news/article/71/", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-24xx/CVE-2007-2458.json b/CVE-2007/CVE-2007-24xx/CVE-2007-2458.json index fb518732aa8..6b85f988554 100644 --- a/CVE-2007/CVE-2007-24xx/CVE-2007-2458.json +++ b/CVE-2007/CVE-2007-24xx/CVE-2007-2458.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2458", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-02T18:19:00.000", - "lastModified": "2017-10-11T01:32:14.003", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -173,17 +173,31 @@ "references": [ { "url": "http://pixaria.com/index.history.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/24821", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.pixaria.com/news/article/70/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.pixaria.com/news/article/71/", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-24xx/CVE-2007-2487.json b/CVE-2007/CVE-2007-24xx/CVE-2007-2487.json index 0cac88684dd..de86c301116 100644 --- a/CVE-2007/CVE-2007-24xx/CVE-2007-2487.json +++ b/CVE-2007/CVE-2007-24xx/CVE-2007-2487.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2487", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-03T17:19:00.000", - "lastModified": "2018-10-16T16:44:13.930", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,13 +71,24 @@ } ], "references": [ + { + "url": "http://osvdb.org/35532", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/25126", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/2675", "source": "cve@mitre.org" }, { "url": "http://www.mexhackteam.org/prethoonker/descargas/Atomixb0f.zip", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/467374/100/0/threaded", diff --git a/CVE-2007/CVE-2007-25xx/CVE-2007-2598.json b/CVE-2007/CVE-2007-25xx/CVE-2007-2598.json index c365d3bcc58..04f35434971 100644 --- a/CVE-2007/CVE-2007-25xx/CVE-2007-2598.json +++ b/CVE-2007/CVE-2007-25xx/CVE-2007-2598.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2598", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-11T10:19:00.000", - "lastModified": "2017-10-11T01:32:17.877", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,14 @@ } ], "references": [ + { + "url": "http://osvdb.org/35910", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/25223", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/23904", "source": "cve@mitre.org" @@ -81,7 +89,10 @@ }, { "url": "http://www.w4ck1ng.com/exploits/w4ck1ng_simplenews.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34220", diff --git a/CVE-2007/CVE-2007-26xx/CVE-2007-2610.json b/CVE-2007/CVE-2007-26xx/CVE-2007-2610.json index 9e17b1b7807..631b01624fa 100644 --- a/CVE-2007/CVE-2007-26xx/CVE-2007-2610.json +++ b/CVE-2007/CVE-2007-26xx/CVE-2007-2610.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2610", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-11T10:19:00.000", - "lastModified": "2017-07-29T01:31:35.923", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,6 +78,17 @@ } ], "references": [ + { + "url": "http://osvdb.org/35871", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/25168", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=507099", "source": "cve@mitre.org", @@ -89,14 +100,16 @@ "url": "http://www.openld.com/forum/viewtopic.php?id=216", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { "url": "http://www.openld.com/forum/viewtopic.php?id=217", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-28xx/CVE-2007-2857.json b/CVE-2007/CVE-2007-28xx/CVE-2007-2857.json index 5464ed1901a..5cb4eed6f3f 100644 --- a/CVE-2007/CVE-2007-28xx/CVE-2007-2857.json +++ b/CVE-2007/CVE-2007-28xx/CVE-2007-2857.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2857", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-24T19:30:00.000", - "lastModified": "2023-11-07T02:00:41.950", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -90,7 +90,10 @@ }, { "url": "http://www.xmors-seurity.com/advisory/excelparser%28rfi%29.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34461", diff --git a/CVE-2007/CVE-2007-28xx/CVE-2007-2859.json b/CVE-2007/CVE-2007-28xx/CVE-2007-2859.json index f878159cc7d..611e5abe8f4 100644 --- a/CVE-2007/CVE-2007-28xx/CVE-2007-2859.json +++ b/CVE-2007/CVE-2007-28xx/CVE-2007-2859.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2859", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-24T19:30:00.000", - "lastModified": "2023-11-07T02:00:42.013", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -117,7 +117,10 @@ }, { "url": "http://www.xmors-seurity.com/advisory/SimpGB%28rfi%29.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34428", diff --git a/CVE-2007/CVE-2007-28xx/CVE-2007-2861.json b/CVE-2007/CVE-2007-28xx/CVE-2007-2861.json index 1960c867679..3a8ee5812ef 100644 --- a/CVE-2007/CVE-2007-28xx/CVE-2007-2861.json +++ b/CVE-2007/CVE-2007-28xx/CVE-2007-2861.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2861", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-24T19:30:00.000", - "lastModified": "2023-11-07T02:00:42.077", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -89,7 +89,10 @@ }, { "url": "http://www.xmors-seurity.com/advisory/SAXON%28rfi%29.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34429", diff --git a/CVE-2007/CVE-2007-31xx/CVE-2007-3163.json b/CVE-2007/CVE-2007-31xx/CVE-2007-3163.json index 220e7091195..226d2a3251c 100644 --- a/CVE-2007/CVE-2007-31xx/CVE-2007-3163.json +++ b/CVE-2007/CVE-2007-31xx/CVE-2007-3163.json @@ -2,7 +2,7 @@ "id": "CVE-2007-3163", "sourceIdentifier": "cve@mitre.org", "published": "2007-06-11T22:30:00.000", - "lastModified": "2017-07-29T01:32:01.393", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,13 +75,28 @@ "url": "http://ha.ckers.org/blog/20070606/additional-image-bypass-on-windows/", "source": "cve@mitre.org" }, + { + "url": "http://osvdb.org/37554", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/25719", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/25923", + "source": "cve@mitre.org" + }, { "url": "http://sourceforge.net/project/shownotes.php?release_id=520159", "source": "cve@mitre.org" }, { "url": "http://www.bitchiller.de/?p=20", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/24510", diff --git a/CVE-2007/CVE-2007-37xx/CVE-2007-3796.json b/CVE-2007/CVE-2007-37xx/CVE-2007-3796.json index 5af2a6e39e3..fbed600dc83 100644 --- a/CVE-2007/CVE-2007-37xx/CVE-2007-3796.json +++ b/CVE-2007/CVE-2007-37xx/CVE-2007-3796.json @@ -2,7 +2,7 @@ "id": "CVE-2007-3796", "sourceIdentifier": "cve@mitre.org", "published": "2007-07-17T23:30:00.000", - "lastModified": "2008-09-05T21:26:39.073", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "evaluatorSolution": "The vendor has released version 6.2.1 to address this issue.", "evaluatorImpact": "\"Successful exploitation requires that the attacker knows the email address of the target user.\"", @@ -81,13 +81,23 @@ "Patch" ] }, + { + "url": "http://secunia.com/advisories/26018", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/2895", "source": "cve@mitre.org" }, { "url": "http://www.sec-1labs.co.uk/advisories/BTA_Full.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/24936", diff --git a/CVE-2007/CVE-2007-39xx/CVE-2007-3938.json b/CVE-2007/CVE-2007-39xx/CVE-2007-3938.json index 9ea41bdce7b..e5b458d9f17 100644 --- a/CVE-2007/CVE-2007-39xx/CVE-2007-3938.json +++ b/CVE-2007/CVE-2007-39xx/CVE-2007-3938.json @@ -2,7 +2,7 @@ "id": "CVE-2007-3938", "sourceIdentifier": "cve@mitre.org", "published": "2007-07-21T00:30:00.000", - "lastModified": "2017-09-29T01:29:10.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,15 +73,30 @@ ], "references": [ { - "url": "http://www.maxdev.com/Article637.phtml", + "url": "http://osvdb.org/36336", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/26113", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, + { + "url": "http://www.maxdev.com/Article637.phtml", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, { "url": "http://www.maxdev.com/mod-Areafiles-display-lid-557.phtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/24969", diff --git a/CVE-2007/CVE-2007-40xx/CVE-2007-4009.json b/CVE-2007/CVE-2007-40xx/CVE-2007-4009.json index 2e14aebe0ec..a27907db169 100644 --- a/CVE-2007/CVE-2007-40xx/CVE-2007-4009.json +++ b/CVE-2007/CVE-2007-40xx/CVE-2007-4009.json @@ -2,7 +2,7 @@ "id": "CVE-2007-4009", "sourceIdentifier": "cve@mitre.org", "published": "2007-07-26T00:30:00.000", - "lastModified": "2017-09-29T01:29:11.610", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,6 +80,13 @@ "url": "ftp://download1.swsoft.com/Confixx/security_hotfix/1/release_notes.txt", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/26300", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/25036", "source": "cve@mitre.org", @@ -96,7 +103,10 @@ }, { "url": "http://xpkzxc.com/exploits/confixx.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35586", diff --git a/CVE-2007/CVE-2007-40xx/CVE-2007-4094.json b/CVE-2007/CVE-2007-40xx/CVE-2007-4094.json index ba90b2c9637..017b93f4afd 100644 --- a/CVE-2007/CVE-2007-40xx/CVE-2007-4094.json +++ b/CVE-2007/CVE-2007-40xx/CVE-2007-4094.json @@ -2,7 +2,7 @@ "id": "CVE-2007-4094", "sourceIdentifier": "cve@mitre.org", "published": "2007-07-30T20:17:00.000", - "lastModified": "2018-10-15T21:33:12.680", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,7 +79,8 @@ "url": "http://www.m3ks.org/adv/m3ks-adv-24.7.07.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-42xx/CVE-2007-4288.json b/CVE-2007/CVE-2007-42xx/CVE-2007-4288.json index 0f2a10004db..c238dd0cf8f 100644 --- a/CVE-2007/CVE-2007-42xx/CVE-2007-4288.json +++ b/CVE-2007/CVE-2007-42xx/CVE-2007-4288.json @@ -2,7 +2,7 @@ "id": "CVE-2007-4288", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-09T21:17:00.000", - "lastModified": "2018-10-15T21:34:19.103", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "http://www.safehack.com/exp/mp/mplayer11.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/475839/100/0/threaded", diff --git a/CVE-2007/CVE-2007-45xx/CVE-2007-4598.json b/CVE-2007/CVE-2007-45xx/CVE-2007-4598.json index ce633a8d0e0..ed845a7e3bd 100644 --- a/CVE-2007/CVE-2007-45xx/CVE-2007-4598.json +++ b/CVE-2007/CVE-2007-45xx/CVE-2007-4598.json @@ -2,7 +2,7 @@ "id": "CVE-2007-4598", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-30T18:17:00.000", - "lastModified": "2008-11-15T06:57:43.217", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,16 @@ "source": "cve@mitre.org" }, { - "url": "http://www.collegeid.com/SurePOS%20500%20Manual.pdf", + "url": "http://osvdb.org/45835", "source": "cve@mitre.org" }, + { + "url": "http://www.collegeid.com/SurePOS%20500%20Manual.pdf", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.hackerfactor.com/papers/cc-pos-20.pdf", "source": "cve@mitre.org" diff --git a/CVE-2007/CVE-2007-52xx/CVE-2007-5222.json b/CVE-2007/CVE-2007-52xx/CVE-2007-5222.json index 90297cf9b5c..7d79ec8b8d0 100644 --- a/CVE-2007/CVE-2007-52xx/CVE-2007-5222.json +++ b/CVE-2007/CVE-2007-52xx/CVE-2007-5222.json @@ -2,7 +2,7 @@ "id": "CVE-2007-5222", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-05T00:17:00.000", - "lastModified": "2017-09-29T01:29:31.487", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,16 @@ } ], "references": [ + { + "url": "http://osvdb.org/38556", + "source": "cve@mitre.org" + }, { "url": "http://www.maxdev.com/Article641.phtml", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-52xx/CVE-2007-5234.json b/CVE-2007/CVE-2007-52xx/CVE-2007-5234.json index 2a4411f8c41..a94862d4beb 100644 --- a/CVE-2007/CVE-2007-52xx/CVE-2007-5234.json +++ b/CVE-2007/CVE-2007-52xx/CVE-2007-5234.json @@ -2,7 +2,7 @@ "id": "CVE-2007-5234", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-05T23:17:00.000", - "lastModified": "2017-09-29T01:29:31.767", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ "references": [ { "url": "http://nicenamecrew.com/exploits/Ossigeno-script.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/25924", diff --git a/CVE-2007/CVE-2007-52xx/CVE-2007-5258.json b/CVE-2007/CVE-2007-52xx/CVE-2007-5258.json index f2262cd9d48..171b235cf65 100644 --- a/CVE-2007/CVE-2007-52xx/CVE-2007-5258.json +++ b/CVE-2007/CVE-2007-52xx/CVE-2007-5258.json @@ -2,7 +2,7 @@ "id": "CVE-2007-5258", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-06T17:17:00.000", - "lastModified": "2008-11-15T07:00:20.517", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,13 +71,20 @@ } ], "references": [ + { + "url": "http://osvdb.org/45519", + "source": "cve@mitre.org" + }, { "url": "http://www.attrition.org/pipermail/vim/2007-October/001820.html", "source": "cve@mitre.org" }, { "url": "http://www.secumania.org/exploits/web-applications/phpfreelog-alpha-v0_2_0--%3C%3D--remote-file-inclusion-vulnerability-2007092832175/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/25873", diff --git a/CVE-2007/CVE-2007-57xx/CVE-2007-5778.json b/CVE-2007/CVE-2007-57xx/CVE-2007-5778.json index f9a706ab858..1718a163457 100644 --- a/CVE-2007/CVE-2007-57xx/CVE-2007-5778.json +++ b/CVE-2007/CVE-2007-57xx/CVE-2007-5778.json @@ -2,8 +2,8 @@ "id": "CVE-2007-5778", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-01T16:46:00.000", - "lastModified": "2018-10-15T21:46:30.097", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:20:30.750", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,11 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" - }, - { - "lang": "en", - "value": "CWE-310" + "value": "CWE-312" } ] } @@ -66,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mobile-spy:mobile-spy:*:*:*:*:*:*:*:*", - "matchCriteriaId": "1C5C050D-E0DB-4D11-801A-E797293B762E" + "criteria": "cpe:2.3:a:flexispy:mobile_spy:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6F80EDC-4C2B-48B5-A266-2B1CF6D92825" } ] } @@ -75,25 +93,58 @@ } ], "references": [ + { + "url": "http://osvdb.org/43625", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://osvdb.org/43626", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://securityreason.com/securityalert/3333", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.airscanner.com/security/07101401_mobilespy.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.informit.com/articles/article.aspx?p=1077909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/482663/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/26177", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-58xx/CVE-2007-5892.json b/CVE-2007/CVE-2007-58xx/CVE-2007-5892.json index 13d89fb5dac..95f26947932 100644 --- a/CVE-2007/CVE-2007-58xx/CVE-2007-5892.json +++ b/CVE-2007/CVE-2007-58xx/CVE-2007-5892.json @@ -2,7 +2,7 @@ "id": "CVE-2007-5892", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-08T02:46:00.000", - "lastModified": "2017-07-29T01:33:55.630", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,9 +72,23 @@ ], "references": [ { - "url": "http://www.dswlab.com/vir/v20071020.html", + "url": "http://osvdb.org/38436", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/27561", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.dswlab.com/vir/v20071020.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.vupen.com/english/advisories/2007/3769", "source": "cve@mitre.org" diff --git a/CVE-2007/CVE-2007-60xx/CVE-2007-6041.json b/CVE-2007/CVE-2007-60xx/CVE-2007-6041.json index 360d94db589..9cec9ff4d51 100644 --- a/CVE-2007/CVE-2007-60xx/CVE-2007-6041.json +++ b/CVE-2007/CVE-2007-60xx/CVE-2007-6041.json @@ -2,7 +2,7 @@ "id": "CVE-2007-6041", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-20T19:46:00.000", - "lastModified": "2017-07-29T01:34:00.537", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,7 +85,18 @@ }, { "url": "http://forum.rigsofrods.com/index.php?topic=3140.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/27729", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/26502", diff --git a/CVE-2007/CVE-2007-62xx/CVE-2007-6224.json b/CVE-2007/CVE-2007-62xx/CVE-2007-6224.json index cefd59ee351..650491d4169 100644 --- a/CVE-2007/CVE-2007-62xx/CVE-2007-6224.json +++ b/CVE-2007/CVE-2007-62xx/CVE-2007-6224.json @@ -2,7 +2,7 @@ "id": "CVE-2007-6224", "sourceIdentifier": "cve@mitre.org", "published": "2007-12-04T18:46:00.000", - "lastModified": "2018-10-30T16:26:24.543", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -96,7 +96,8 @@ "url": "http://www.safehack.com/Advisory/realpdos.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-62xx/CVE-2007-6235.json b/CVE-2007/CVE-2007-62xx/CVE-2007-6235.json index afeb0e71b20..a567f7dd105 100644 --- a/CVE-2007/CVE-2007-62xx/CVE-2007-6235.json +++ b/CVE-2007/CVE-2007-62xx/CVE-2007-6235.json @@ -2,7 +2,7 @@ "id": "CVE-2007-6235", "sourceIdentifier": "cve@mitre.org", "published": "2007-12-04T18:46:00.000", - "lastModified": "2018-10-15T21:51:21.857", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ "references": [ { "url": "http://www.safehack.com/Advisory/realpdos_au.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/484449/100/0/threaded", diff --git a/CVE-2007/CVE-2007-64xx/CVE-2007-6424.json b/CVE-2007/CVE-2007-64xx/CVE-2007-6424.json index 1c9e4981130..87388323a1f 100644 --- a/CVE-2007/CVE-2007-64xx/CVE-2007-6424.json +++ b/CVE-2007/CVE-2007-64xx/CVE-2007-6424.json @@ -2,7 +2,7 @@ "id": "CVE-2007-6424", "sourceIdentifier": "cve@mitre.org", "published": "2007-12-18T19:46:00.000", - "lastModified": "2022-04-18T09:37:06.043", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://osvdb.org/44136", + "source": "cve@mitre.org" + }, { "url": "http://voipsa.org/blog/2007/12/17/trixbox-contains-phone-home-code-to-retrieve-arbitrary-commands-to-execute/", "source": "cve@mitre.org" @@ -91,7 +95,8 @@ "url": "http://www.superunknown.org/pivot/entry.php?id=15", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2007/CVE-2007-65xx/CVE-2007-6597.json b/CVE-2007/CVE-2007-65xx/CVE-2007-6597.json index b5f959914e3..06b90f130fa 100644 --- a/CVE-2007/CVE-2007-65xx/CVE-2007-6597.json +++ b/CVE-2007/CVE-2007-65xx/CVE-2007-6597.json @@ -2,7 +2,7 @@ "id": "CVE-2007-6597", "sourceIdentifier": "cve@mitre.org", "published": "2007-12-31T19:46:00.000", - "lastModified": "2018-10-15T21:55:23.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,21 @@ } ], "references": [ + { + "url": "http://osvdb.org/39860", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/39861", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/28252", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/3504", "source": "cve@mitre.org" @@ -86,7 +101,10 @@ }, { "url": "http://www.iportalx.net/forum/forum_posts.asp?TID=3465&PN=1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/485546/100/0/threaded", diff --git a/CVE-2008/CVE-2008-00xx/CVE-2008-0087.json b/CVE-2008/CVE-2008-00xx/CVE-2008-0087.json index 80378689d01..f021d3ea33a 100644 --- a/CVE-2008/CVE-2008-00xx/CVE-2008-0087.json +++ b/CVE-2008/CVE-2008-00xx/CVE-2008-0087.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0087", "sourceIdentifier": "secure@microsoft.com", "published": "2008-04-08T23:05:00.000", - "lastModified": "2018-10-30T16:25:38.340", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:54:54.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-330" } ] } @@ -62,43 +84,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows-nt:xp:sp2:*:*:pro:*:x64:*", - "matchCriteriaId": "97A263BB-2103-4047-A8AB-1AB46EC73120" + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", + "matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", - "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "43D64F8D-975A-4A5B-BEDF-D27D65C96A29" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "FE8F4276-4D97-480D-A542-FE9982FFD765" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:itanium:*", - "matchCriteriaId": "5A5D4DFE-2F35-4A07-AA7F-7F545C61E00C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:itanium:*", - "matchCriteriaId": "39F303CD-DB64-4FE6-AB4F-461E5E8AFB83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:x64:*", - "matchCriteriaId": "17804445-2C63-4381-A721-7F3BB3DC645F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:x64:*", - "matchCriteriaId": "06E7E0F7-AA6F-477C-AAA7-C0419CD2F3BC" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*", + "matchCriteriaId": "4902A7BD-0645-4CAC-8EA8-24BD2D8B893A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" } ] } @@ -114,14 +131,28 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/29696", + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, { "url": "http://www.securityfocus.com/archive/1/490575/100/0/threaded", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/28553", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" @@ -131,6 +162,7 @@ "url": "http://www.securitytracker.com/id?1019802", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -146,6 +178,7 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA08-099A.html", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "US Government Resource" ] @@ -159,12 +192,17 @@ }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-020", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5314", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory" ] } diff --git a/CVE-2008/CVE-2008-01xx/CVE-2008-0174.json b/CVE-2008/CVE-2008-01xx/CVE-2008-0174.json index 9cfd4f6852b..386f03ae097 100644 --- a/CVE-2008/CVE-2008-01xx/CVE-2008-0174.json +++ b/CVE-2008/CVE-2008-01xx/CVE-2008-0174.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0174", "sourceIdentifier": "cret@cert.org", "published": "2008-01-29T02:00:00.000", - "lastModified": "2018-10-15T21:58:24.030", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:31:48.540", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-312" } ] } @@ -62,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ge_fanuc:proficy_real-time_information_portal:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ge:proficy_real-time_information_portal:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.6", - "matchCriteriaId": "2EE7021B-BA05-4F4A-A1C0-4DCA860B897C" + "matchCriteriaId": "C56FDE31-26E9-4221-8A9B-94F45D753849" } ] } @@ -74,34 +96,61 @@ "references": [ { "url": "http://securityreason.com/securityalert/3590", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1019273", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/180876", "source": "cret@cert.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/archive/1/487075/100/0/threaded", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/487244/100/0/threaded", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30754", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-09xx/CVE-2008-0956.json b/CVE-2008/CVE-2008-09xx/CVE-2008-0956.json index f214a01573e..6691e944396 100644 --- a/CVE-2008/CVE-2008-09xx/CVE-2008-0956.json +++ b/CVE-2008/CVE-2008-09xx/CVE-2008-0956.json @@ -2,7 +2,7 @@ "id": "CVE-2008-0956", "sourceIdentifier": "cret@cert.org", "published": "2008-06-12T02:32:00.000", - "lastModified": "2018-10-12T21:45:06.943", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -80,12 +80,29 @@ "references": [ { "url": "http://backweb.com/news_events/press_releases/051608.php", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=121380194923597&w=2", "source": "cret@cert.org" }, + { + "url": "http://secunia.com/advisories/30598", + "source": "cret@cert.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30625", + "source": "cret@cert.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.kb.cert.org/vuls/id/216153", "source": "cret@cert.org", diff --git a/CVE-2008/CVE-2008-11xx/CVE-2008-1160.json b/CVE-2008/CVE-2008-11xx/CVE-2008-1160.json index 8b56910d46e..66acd563575 100644 --- a/CVE-2008/CVE-2008-11xx/CVE-2008-1160.json +++ b/CVE-2008/CVE-2008-11xx/CVE-2008-1160.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1160", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-25T00:44:00.000", - "lastModified": "2024-02-13T16:46:30.653", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -124,7 +124,8 @@ "url": "http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-12xx/CVE-2008-1206.json b/CVE-2008/CVE-2008-12xx/CVE-2008-1206.json index b1dd33ae912..6720afcbd61 100644 --- a/CVE-2008/CVE-2008-12xx/CVE-2008-1206.json +++ b/CVE-2008/CVE-2008-12xx/CVE-2008-1206.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1206", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-08T00:44:00.000", - "lastModified": "2017-08-08T01:29:57.620", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,6 +78,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/29219", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/28099", "source": "cve@mitre.org" @@ -86,7 +93,8 @@ "url": "http://www.vashnukad.com/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-12xx/CVE-2008-1219.json b/CVE-2008/CVE-2008-12xx/CVE-2008-1219.json index d9795759bc8..8b82703eef1 100644 --- a/CVE-2008/CVE-2008-12xx/CVE-2008-1219.json +++ b/CVE-2008/CVE-2008-12xx/CVE-2008-1219.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1219", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-10T17:44:00.000", - "lastModified": "2018-10-11T20:30:11.507", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/29279", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/3722", "source": "cve@mitre.org" @@ -79,7 +86,8 @@ "url": "http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3058", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-12xx/CVE-2008-1298.json b/CVE-2008/CVE-2008-12xx/CVE-2008-1298.json index 78c0dac7d0c..e06519ca794 100644 --- a/CVE-2008/CVE-2008-12xx/CVE-2008-1298.json +++ b/CVE-2008/CVE-2008-12xx/CVE-2008-1298.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1298", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-12T17:44:00.000", - "lastModified": "2018-10-11T20:31:36.120", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/29322", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/3730", "source": "cve@mitre.org" @@ -84,7 +91,8 @@ "url": "http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3078", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-13xx/CVE-2008-1315.json b/CVE-2008/CVE-2008-13xx/CVE-2008-1315.json index 47594fb28f9..1b672436b41 100644 --- a/CVE-2008/CVE-2008-13xx/CVE-2008-1315.json +++ b/CVE-2008/CVE-2008-13xx/CVE-2008-1315.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1315", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-13T14:44:00.000", - "lastModified": "2018-10-11T20:31:42.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,8 @@ "url": "http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3109", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-14xx/CVE-2008-1408.json b/CVE-2008/CVE-2008-14xx/CVE-2008-1408.json index ad44856078e..de9f4137fec 100644 --- a/CVE-2008/CVE-2008-14xx/CVE-2008-1408.json +++ b/CVE-2008/CVE-2008-14xx/CVE-2008-1408.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1408", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-20T10:44:00.000", - "lastModified": "2017-09-29T01:30:41.427", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,9 +75,19 @@ "url": "http://irk4z.wordpress.com/2008/03/16/phpbp-rc3-2204-fix4-remote-sql-injection-vulnerability/", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/29411", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.phpbp.com/filedownload-phpbp2-RC3-204-fix5_22.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/28272", diff --git a/CVE-2008/CVE-2008-15xx/CVE-2008-1526.json b/CVE-2008/CVE-2008-15xx/CVE-2008-1526.json index b45ec0822c6..28597ed29e2 100644 --- a/CVE-2008/CVE-2008-15xx/CVE-2008-1526.json +++ b/CVE-2008/CVE-2008-15xx/CVE-2008-1526.json @@ -2,8 +2,8 @@ "id": "CVE-2008-1526", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-26T10:44:00.000", - "lastModified": "2018-10-11T20:35:17.723", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:54:31.833", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,13 +70,14 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-916" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -62,48 +85,638 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*", - "matchCriteriaId": "B9B37DD5-40E7-43E3-8183-A755C488E383" + "criteria": "cpe:2.3:o:zyxel:p-663hn-51_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "62972D5A-85C3-4DD4-A26A-471D4E82357F" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*", - "matchCriteriaId": "D2850459-830C-49FD-89F8-0693E6D33543" + "criteria": "cpe:2.3:o:zyxel:p-663hn-51_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "4E92F1B9-AF50-4E0D-B3AC-3C306A383A44" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-663hn-51:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F2A8EAA-E91F-48D8-82F9-0719C6F6BB2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660h-61_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "5252D640-B50B-4532-ABBD-912A37F596DD" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*", - "matchCriteriaId": "7C2C98B6-E370-4E2C-988D-CC3F3AA78126" + "criteria": "cpe:2.3:o:zyxel:p-660h-61_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "F5B68B4A-D806-49C8-AE14-504BE57CAB95" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660h-61:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B996FCFC-C719-43B1-9088-3867D5C124BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660h-63_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "39CB46BC-64D2-46AE-BD36-1A79EB36B292" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*", - "matchCriteriaId": "AC9ED360-9257-477C-8F21-0CD4C1D38F42" + "criteria": "cpe:2.3:o:zyxel:p-660h-63_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "5142FA69-CA58-46F4-BCDD-9798DCCB3AD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660h-63:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0F5B1A3-7A36-4A84-B0C1-508036A0AB5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660h-67_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "67B02999-B7EB-402E-8146-020ACC9ED382" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*", - "matchCriteriaId": "B170D9D8-4A01-4A97-947C-F978B07045C2" + "criteria": "cpe:2.3:o:zyxel:p-660h-67_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "76279D36-5A32-4B6E-9F78-3EEFB70E55C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660h-67:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D676131-6B32-4B57-8E77-95A9F63375B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660h-d1_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "DD203D62-1938-4521-81D5-154A7425B9B8" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*", - "matchCriteriaId": "9D759579-E9E7-4344-BA88-CACECFB9C731" + "criteria": "cpe:2.3:o:zyxel:p-660h-d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "3295C0E2-C458-4902-8694-2A3ACFBCE653" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660h-d1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF5193DA-10B0-4C7D-B210-CF074E531215" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660h-d3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "9001B98C-9F05-4C1A-8193-D1B553484A7D" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*", - "matchCriteriaId": "35DB7E44-E00E-41E3-A701-FB5DAC8E48E1" + "criteria": "cpe:2.3:o:zyxel:p-660h-d3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "910FB6FC-66EC-48EE-8D61-BAE34D7BFB65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660h-d3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38FD0899-E818-461E-B6FA-48E9564BBB04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hn-51_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "C9D5E082-EFA6-4EC1-B0F7-D4F41D713F92" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*", - "matchCriteriaId": "2344FB7D-785D-4C52-BF27-1EEAAB2726B8" + "criteria": "cpe:2.3:o:zyxel:p-660hn-51_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "D1199BFD-05AF-4307-805D-8CFE09DC9FBA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660hn-51:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0138796-FFDC-4976-83AB-018DD7CD7D5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660h-t1_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "C5E642F1-A6C9-47D8-B8CA-591B925AD632" }, { "vulnerable": true, - "criteria": "cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*", - "matchCriteriaId": "CEA7FE7B-31E2-4164-882B-2E9712F95044" + "criteria": "cpe:2.3:o:zyxel:p-660h-t1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "92A66C1F-D2BC-46D2-920B-AF81E4964D2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660h-t1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7AFE9380-506C-4DB6-B14E-BF8D36A5B403" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hw_d1_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "88F93947-8F4C-4297-BDC1-248C279A3C66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hw_d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "15EADE70-CC53-4FFD-A7A0-6F47112DEFF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660hw_d1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D13FB1A-637D-4E69-B84F-05531DCA5769" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hw_d3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "20A15016-C985-4DC2-8063-20B34A8F38C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hw_d3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "211F500D-83A0-4E98-A602-5A8E28DA80C6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660hw_d3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "465FD6ED-C294-49B2-8F2C-8EF0633DABFF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hw_t3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "E6200AB4-23E4-4D5D-AE01-FA77BD2802E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-660hw_t3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "7EBA6080-40A5-41B8-9ABA-DE9B4D14B905" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-660hw_t3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26E8D38B-1859-4DCE-A566-777432CB7E9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661hnu-f1_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "75CC92BC-C701-4CDB-B3BD-D1A35AE2B513" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661hnu-f1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "B1C64678-E7F5-4D49-B057-81A7D332FAEE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-661hnu-f1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D31A24A-C61D-4C9E-ADB7-2A82348A1F8F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661h_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "571F3900-C4E5-4BA7-BCC4-6F4CB11C37FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661h_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "82811C5C-C3B3-4F59-B4C7-FF94337575A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-661h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC4294BF-24E3-48CB-9C9C-3F212DC3B44C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661hw-d1_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "F45DA65D-375A-44C3-8C13-56BE11A62D96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661hw-d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "3D302F58-44B7-4664-8C5B-CD7801BC2C8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-661hw-d1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "213239B3-6262-43BD-9789-895123B458CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661hnu-f3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "9E098395-FAA8-4F2F-9BA3-CE020128CC4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-661hnu-f3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "1B7AC499-C52B-4320-9DAC-32268EA2EE2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-661hnu-f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C246CBE-3153-48F6-9DB3-111496519A54" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662hw-d3_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "E0FF5102-C646-4576-B06B-7AEDF30597AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662hw-d3_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "08C40AFF-B177-41D6-AB6B-7684F76B04D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-662hw-d3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "293A9D18-75F3-4925-A823-783C5D3C5712" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662hw-d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "248CEACF-760B-400F-AAF8-3942207D7D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662hw-d_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "9D3C331D-6579-4A53-A0E1-7B191F52D78F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-662hw-d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFCEFCAB-785B-441D-9CCF-B45FC769A648" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662hw-d1_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "4D84E350-5816-4ABE-A2A1-ABB719DFB65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662hw-d1_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "E7823501-F6A1-4F4A-98B8-6B272AB6073B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-662hw-d1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF7B15B0-7767-4338-9B27-94AB74D87E2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662h-61_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.40\\(agd.2\\)", + "versionEndIncluding": "3.40\\(ahq.3\\)", + "matchCriteriaId": "C92F00FE-2074-484E-A65E-6E6AADC6625E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:p-662h-61_firmware:3.40\\(pe9\\):*:*:*:*:*:*:*", + "matchCriteriaId": "48C44A40-5559-483D-B532-2CEB60E0D709" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:p-662h-61:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E24CF1BB-6CE2-475F-A74E-6958FEA47374" } ] } @@ -113,15 +726,26 @@ "references": [ { "url": "http://www.gnucitizen.org/projects/router-hacking-challenge/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/489009/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-15xx/CVE-2008-1567.json b/CVE-2008/CVE-2008-15xx/CVE-2008-1567.json index 90b0211b8f3..4b229e339be 100644 --- a/CVE-2008/CVE-2008-15xx/CVE-2008-1567.json +++ b/CVE-2008/CVE-2008-15xx/CVE-2008-1567.json @@ -2,8 +2,8 @@ "id": "CVE-2008-1567", "sourceIdentifier": "cve@mitre.org", "published": "2008-03-31T22:44:00.000", - "lastModified": "2017-08-08T01:30:15.730", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:31:58.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-312" } ] } @@ -62,83 +84,69 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7E6C869A-0307-40D9-85D6-05453B6BEA35" + "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.11.5.1", + "matchCriteriaId": "978C2DD8-2223-42D1-A777-23B74C52C86B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*", + "matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CABB8831-0951-4E3B-B983-FC390A622FEC" + "criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", + "matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "24818450-FDA1-429A-AC17-68F44F584217" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BEE37166-AC6C-473A-8266-38417C6F2167" + "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "37C15B2C-D4A9-4946-8EB9-B6C131D6E8D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "795B4F23-BA5E-466B-9FC3-C7A00A110774" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4EC1F099-04AC-4210-8477-07B21E087162" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "962B49A9-380D-4B19-929B-50793EF621C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4BC82C85-C9CF-424D-A07A-E841F7AC1904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E0549FC5-B8E8-455D-867B-BAF321DE7004" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "01DA6D40-2D3A-4490-B4E6-1367C585ED9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "34AB221E-3DFA-43E4-9DBA-5565F81C0120" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FCB774D1-8B5D-4118-8A5B-D7D14D7DE162" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6C10F7C9-FAAA-4D05-8CB2-F5CB397F8410" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2F8AAB78-8460-43BB-9326-0395F7496EC8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3329598B-BEA5-4119-A558-DAA432239A84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EA5BCF7D-43FC-459C-8564-F0DCDC301FC8" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" } ] } @@ -148,26 +156,88 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/29588", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/29613", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/29964", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/30816", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/32834", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/33822", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1909711&group_id=23067&atid=377408", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1557", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:131", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-2", @@ -181,27 +251,41 @@ "url": "http://www.securityfocus.com/bid/28560", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2008/1037/references", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41541", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00031.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00080.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1760.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1760.json index e918384a93c..dc6fe9bff5c 100644 --- a/CVE-2008/CVE-2008-17xx/CVE-2008-1760.json +++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1760.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1760", "sourceIdentifier": "cve@mitre.org", "published": "2008-04-12T20:05:00.000", - "lastModified": "2017-09-29T01:30:51.240", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -97,9 +97,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/29684", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.blogator-script.com/changelog.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/28627", diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1763.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1763.json index e7ada58588b..6992cd405eb 100644 --- a/CVE-2008/CVE-2008-17xx/CVE-2008-1763.json +++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1763.json @@ -2,7 +2,7 @@ "id": "CVE-2008-1763", "sourceIdentifier": "cve@mitre.org", "published": "2008-04-12T20:05:00.000", - "lastModified": "2018-10-11T20:36:45.587", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,9 +76,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/29684", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.blogator-script.com/changelog.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/490500/100/0/threaded", diff --git a/CVE-2008/CVE-2008-20xx/CVE-2008-2020.json b/CVE-2008/CVE-2008-20xx/CVE-2008-2020.json index 2fd8c637b4d..42fec1ed838 100644 --- a/CVE-2008/CVE-2008-20xx/CVE-2008-2020.json +++ b/CVE-2008/CVE-2008-20xx/CVE-2008-2020.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2020", "sourceIdentifier": "cve@mitre.org", "published": "2008-04-30T01:07:00.000", - "lastModified": "2018-10-11T20:38:49.687", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:55:02.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-330" } ] } @@ -77,13 +99,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:opendb:opendb:1.5.0b4:*:*:*:*:*:*:*", - "matchCriteriaId": "F1F70542-48CE-437E-BEA2-56E43D52DC22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php-nuke:php-nuke:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DA4AF173-293B-4867-9497-82C25AFA2A1E" + "criteria": "cpe:2.3:a:opendb:opendb:1.5.0:beta4:*:*:*:*:*:*", + "matchCriteriaId": "0D1D7CD9-80EA-4D43-AB3A-BF833DB9F144" }, { "vulnerable": true, @@ -97,8 +114,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:torrentflux:torrentflux:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9FF1CC35-4592-4B8B-B023-D0C5DA7B1CF5" + "criteria": "cpe:2.3:a:phpnuke:php-nuke:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B8442671-45B5-48F6-905F-41A8FD3BF301" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:torrentflux_project:torrentflux:2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E8B86EC9-2E6B-4BDE-B131-8BD82500D041" }, { "vulnerable": true, @@ -113,23 +135,43 @@ "references": [ { "url": "http://securityreason.com/securityalert/3834", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.rooksecurity.com/blog/?p=6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/491127/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/28877", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42152", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-24xx/CVE-2008-2433.json b/CVE-2008/CVE-2008-24xx/CVE-2008-2433.json index a936e8fe6fb..a76f979e9d3 100644 --- a/CVE-2008/CVE-2008-24xx/CVE-2008-2433.json +++ b/CVE-2008/CVE-2008-24xx/CVE-2008-2433.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2433", "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "published": "2008-08-27T20:41:00.000", - "lastModified": "2018-10-11T20:41:29.677", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:01:05.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-330" } ] } @@ -62,33 +84,25 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:trend_micro:client_server_messaging_suite:3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5437BD83-90F0-4E2A-AC9A-A6A48DFAA9E2" + "criteria": "cpe:2.3:a:trendmicro:client_server_messaging_suite:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8A52DAF7-6BAE-49BB-8D2B-D55E6F8D224C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:trend_micro:client_server_messaging_suite:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "99DA925F-6AC2-454E-A417-1EB3E56DCEDD" + "criteria": "cpe:2.3:a:trendmicro:client_server_messaging_suite:3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "92B2575D-83A5-4D0B-AC4B-ED8F54F88AD8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:trend_micro:officescan:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0B4D4F2B-4B34-42DA-A23A-16490F19EF53" + "criteria": "cpe:2.3:a:trendmicro:officescan:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndIncluding": "8.0", + "matchCriteriaId": "F2B08044-1420-4425-B341-31039DA04291" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "38BD1ADE-408F-45D0-BD0B-FBC83ED976F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trend_micro:officescan:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A05A70AB-32D4-4948-94B2-DCFED9155DFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:trend_micro:worry_free_business_security:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BB06F18F-DE90-43FE-8B23-AC2784BBB2C8" + "criteria": "cpe:2.3:a:trendmicro:worry-free_business_security:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "99FDC9B1-1D65-4F09-9308-B602B78F4C5A" } ] } @@ -96,37 +110,85 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31373", + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2008-31/advisory/", + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4191", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/495670/100/0/threaded", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30792", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1020732", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2421", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44597", - "source": "PSIRT-CNA@flexerasoftware.com" + "source": "PSIRT-CNA@flexerasoftware.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-25xx/CVE-2008-2557.json b/CVE-2008/CVE-2008-25xx/CVE-2008-2557.json index 5cb49cd816d..bccb358c099 100644 --- a/CVE-2008/CVE-2008-25xx/CVE-2008-2557.json +++ b/CVE-2008/CVE-2008-25xx/CVE-2008-2557.json @@ -2,7 +2,7 @@ "id": "CVE-2008-2557", "sourceIdentifier": "cve@mitre.org", "published": "2008-06-05T21:32:00.000", - "lastModified": "2017-08-08T01:31:09.043", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,6 +74,13 @@ "references": [ { "url": "http://oscommerceuniversity.com/lounge/index.php?topic=249.0", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/30655", "source": "cve@mitre.org" }, { diff --git a/CVE-2008/CVE-2008-25xx/CVE-2008-2558.json b/CVE-2008/CVE-2008-25xx/CVE-2008-2558.json index a54b4c79ee0..f9f19cd6ed0 100644 --- a/CVE-2008/CVE-2008-25xx/CVE-2008-2558.json +++ b/CVE-2008/CVE-2008-25xx/CVE-2008-2558.json @@ -2,7 +2,7 @@ "id": "CVE-2008-2558", "sourceIdentifier": "cve@mitre.org", "published": "2008-06-05T21:32:00.000", - "lastModified": "2017-08-08T01:31:09.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -74,7 +74,10 @@ "references": [ { "url": "http://oscommerceuniversity.com/lounge/index.php?topic=255.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42889", diff --git a/CVE-2008/CVE-2008-33xx/CVE-2008-3353.json b/CVE-2008/CVE-2008-33xx/CVE-2008-3353.json index 2aea11993f5..c9e05630a32 100644 --- a/CVE-2008/CVE-2008-33xx/CVE-2008-3353.json +++ b/CVE-2008/CVE-2008-33xx/CVE-2008-3353.json @@ -2,7 +2,7 @@ "id": "CVE-2008-3353", "sourceIdentifier": "cve@mitre.org", "published": "2008-07-28T17:41:00.000", - "lastModified": "2017-08-08T01:31:48.497", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -229,7 +229,17 @@ "references": [ { "url": "http://puresw.com/kb/idx.php/8/025/article/Changelog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/31217", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/30367", diff --git a/CVE-2008/CVE-2008-34xx/CVE-2008-3421.json b/CVE-2008/CVE-2008-34xx/CVE-2008-3421.json index 21f1cf7c459..b4028f4c619 100644 --- a/CVE-2008/CVE-2008-34xx/CVE-2008-3421.json +++ b/CVE-2008/CVE-2008-34xx/CVE-2008-3421.json @@ -2,7 +2,7 @@ "id": "CVE-2008-3421", "sourceIdentifier": "cve@mitre.org", "published": "2008-07-31T17:41:00.000", - "lastModified": "2017-08-08T01:31:52.327", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,17 @@ "references": [ { "url": "http://ceaseless.ws/bb-csrf/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/31177", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.securitytracker.com/id?1020559", diff --git a/CVE-2008/CVE-2008-36xx/CVE-2008-3612.json b/CVE-2008/CVE-2008-36xx/CVE-2008-3612.json index 1f77c178942..b0a0afac720 100644 --- a/CVE-2008/CVE-2008-36xx/CVE-2008-3612.json +++ b/CVE-2008/CVE-2008-36xx/CVE-2008-3612.json @@ -2,7 +2,7 @@ "id": "CVE-2008-3612", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-11T01:13:09.227", - "lastModified": "2011-06-20T04:00:00.000", + "lastModified": "2024-02-14T16:07:54.400", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-330" } ] } @@ -62,33 +84,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:apple:iphone:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "70647BF0-56BE-44ED-A6E7-10C372E0BA0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:apple:iphone:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7DCD5B89-81D3-4816-80B4-B427127DB889" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:apple:iphone:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2B045BAF-EB4A-409F-97E7-1DB3E89ACD5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:apple:ipod_touch:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "188712AA-31CA-4209-9042-D6E986C630A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:apple:ipod_touch:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "964F39E4-541C-4562-B915-3254FBFBB304" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:apple:ipod_touch:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7600D384-9832-4451-B836-ADAF0E76755D" + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.0.2", + "matchCriteriaId": "085D061E-6EF1-41BB-936E-D2EE778301FA" } ] } @@ -100,6 +99,7 @@ "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -107,6 +107,23 @@ "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html", "source": "cve@mitre.org", "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/31823", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/31900", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -126,16 +143,27 @@ }, { "url": "http://www.securityfocus.com/bid/31092", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1020848", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2525", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -143,6 +171,7 @@ "url": "http://www.vupen.com/english/advisories/2008/2558", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3878.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3878.json index 248a3c4648d..13af9d44803 100644 --- a/CVE-2008/CVE-2008-38xx/CVE-2008-3878.json +++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3878.json @@ -2,7 +2,7 @@ "id": "CVE-2008-3878", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-02T15:41:00.000", - "lastModified": "2017-09-29T01:31:53.993", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31632", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4200", "source": "cve@mitre.org" @@ -81,13 +88,17 @@ }, { "url": "http://www.shinnai.net/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1219826651.ff.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.shinnai.net/xplits/TXT_RvfuIrwypWLMaiVn33Iy.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-38xx/CVE-2008-3879.json b/CVE-2008/CVE-2008-38xx/CVE-2008-3879.json index 3e58a513998..41e50efebd0 100644 --- a/CVE-2008/CVE-2008-38xx/CVE-2008-3879.json +++ b/CVE-2008/CVE-2008-38xx/CVE-2008-3879.json @@ -2,7 +2,7 @@ "id": "CVE-2008-3879", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-02T15:41:00.000", - "lastModified": "2017-09-29T01:31:54.053", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31632", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4201", "source": "cve@mitre.org" @@ -82,13 +89,17 @@ }, { "url": "http://www.shinnai.net/index.php?mod=02_Forum&group=Security&argument=Remote_performed_exploits&topic=1219827906.ff.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.shinnai.net/xplits/TXT_NPku7jFjRufaz85U6Lxn.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-42xx/CVE-2008-4246.json b/CVE-2008/CVE-2008-42xx/CVE-2008-4246.json index 4c2a2763a60..4a8a9d63ded 100644 --- a/CVE-2008/CVE-2008-42xx/CVE-2008-4246.json +++ b/CVE-2008/CVE-2008-42xx/CVE-2008-4246.json @@ -2,7 +2,7 @@ "id": "CVE-2008-4246", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-25T19:25:18.787", - "lastModified": "2017-08-08T01:32:31.530", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -90,7 +90,15 @@ "url": "http://denorastats.org/?p=home", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" + ] + }, + { + "url": "http://dev.denorastats.org/news/show/4", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-43xx/CVE-2008-4342.json b/CVE-2008/CVE-2008-43xx/CVE-2008-4342.json index 1c1a20c2982..5260c23baa9 100644 --- a/CVE-2008/CVE-2008-43xx/CVE-2008-4342.json +++ b/CVE-2008/CVE-2008-43xx/CVE-2008-4342.json @@ -2,7 +2,7 @@ "id": "CVE-2008-4342", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-30T17:22:09.507", - "lastModified": "2018-10-11T20:51:40.553", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,6 +98,34 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/31936", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/31949", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/31950", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/32455", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/archive/1/497831/100/0/threaded", "source": "cve@mitre.org" @@ -113,7 +141,8 @@ "url": "http://www.shinnai.net/xplits/TXT_TrWE9AJA8nQpuFsnxBcq", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-43xx/CVE-2008-4343.json b/CVE-2008/CVE-2008-43xx/CVE-2008-4343.json index c4df68233bb..04ee0ef81c4 100644 --- a/CVE-2008/CVE-2008-43xx/CVE-2008-4343.json +++ b/CVE-2008/CVE-2008-43xx/CVE-2008-4343.json @@ -2,7 +2,7 @@ "id": "CVE-2008-4343", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-30T17:22:09.537", - "lastModified": "2017-09-29T01:32:07.227", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31951", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/31332", "source": "cve@mitre.org" @@ -80,7 +87,8 @@ "url": "http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-47xx/CVE-2008-4728.json b/CVE-2008/CVE-2008-47xx/CVE-2008-4728.json index e3bc81fd720..705f7970033 100644 --- a/CVE-2008/CVE-2008-47xx/CVE-2008-4728.json +++ b/CVE-2008/CVE-2008-47xx/CVE-2008-4728.json @@ -2,7 +2,7 @@ "id": "CVE-2008-4728", "sourceIdentifier": "cve@mitre.org", "published": "2008-10-24T00:00:00.947", - "lastModified": "2017-09-29T01:32:19.337", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/32337", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/31799", "source": "cve@mitre.org" @@ -79,21 +86,24 @@ "url": "http://www.shinnai.net/xplits/TXT_2XfQ1sHruhjaoePszNTG.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://www.shinnai.net/xplits/TXT_JqLchaIAfq4kSH0NsvJO.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://www.shinnai.net/xplits/TXT_L0z0Mimixdsko8kI6VFW.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-47xx/CVE-2008-4737.json b/CVE-2008/CVE-2008-47xx/CVE-2008-4737.json index e66d4525847..ddce88f7278 100644 --- a/CVE-2008/CVE-2008-47xx/CVE-2008-4737.json +++ b/CVE-2008/CVE-2008-47xx/CVE-2008-4737.json @@ -2,7 +2,7 @@ "id": "CVE-2008-4737", "sourceIdentifier": "cve@mitre.org", "published": "2008-10-24T10:30:01.033", - "lastModified": "2008-10-24T10:30:01.033", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -71,15 +71,34 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/32085", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/48630", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/31436", "source": "cve@mitre.org" }, + { + "url": "http://www.tryag.com/cc/showthread.php?t=27577", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + }, { "url": "http://yee7.com/forums/showthread.php?p=8021", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2008/CVE-2008-49xx/CVE-2008-4929.json b/CVE-2008/CVE-2008-49xx/CVE-2008-4929.json index 100ca29a3f4..295d8a73a33 100644 --- a/CVE-2008/CVE-2008-49xx/CVE-2008-4929.json +++ b/CVE-2008/CVE-2008-49xx/CVE-2008-4929.json @@ -2,8 +2,8 @@ "id": "CVE-2008-4929", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-04T21:00:05.957", - "lastModified": "2011-03-08T03:13:31.000", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:09:48.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-330" } ] } @@ -75,6 +97,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2008-10/0203.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, @@ -82,6 +105,7 @@ "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-10/0472.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, @@ -89,16 +113,25 @@ "url": "http://www.openwall.com/lists/oss-security/2008/11/01/2", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Mailing List" ] }, { "url": "http://www.securityfocus.com/bid/31936", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2967", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-50xx/CVE-2008-5005.json b/CVE-2008/CVE-2008-50xx/CVE-2008-5005.json index d3f3155ebde..974580ad7c2 100644 --- a/CVE-2008/CVE-2008-50xx/CVE-2008-5005.json +++ b/CVE-2008/CVE-2008-50xx/CVE-2008-5005.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5005", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-10T14:12:56.140", - "lastModified": "2018-10-11T20:53:17.987", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -189,6 +189,25 @@ "url": "http://rhn.redhat.com/errata/RHSA-2009-0275.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/32483", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/32512", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/33142", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/33996", + "source": "cve@mitre.org" + }, { "url": "http://securityreason.com/securityalert/4570", "source": "cve@mitre.org" @@ -201,9 +220,19 @@ "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-065.htm", "source": "cve@mitre.org" }, + { + "url": "http://www.bitsec.com/en/rad/bsa-081103.c", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.bitsec.com/en/rad/bsa-081103.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1685", diff --git a/CVE-2008/CVE-2008-51xx/CVE-2008-5162.json b/CVE-2008/CVE-2008-51xx/CVE-2008-5162.json index c4cd2e15a4a..80f61714451 100644 --- a/CVE-2008/CVE-2008-51xx/CVE-2008-5162.json +++ b/CVE-2008/CVE-2008-51xx/CVE-2008-5162.json @@ -2,8 +2,8 @@ "id": "CVE-2008-5162", "sourceIdentifier": "secteam@freebsd.org", "published": "2008-11-26T23:30:00.467", - "lastModified": "2008-12-03T06:46:29.097", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:09:58.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,11 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" - }, - { - "lang": "en", - "value": "CWE-362" + "value": "CWE-330" } ] } @@ -66,23 +84,155 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F702C46F-CA02-4FA2-B7D6-C61C2C095679" + "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "7.0", + "matchCriteriaId": "62111AD4-A714-4D00-A501-D3D304BD687C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F7F02A-C845-40BF-8490-510A070000F3" + "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2D9F4FEB-30E5-4EF6-BEB6-0F1A4DE7EFB9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "47E0A416-733A-4616-AE08-150D67FCEA70" + "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "BB6FC258-9735-4199-9499-ACFCEF30EE5E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "803EFA9F-B7CB-4511-B1C1-381170CA9A23" + "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "BA825CA5-84B6-4DA4-9F7F-644E532185A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*", + "matchCriteriaId": "90B64FDC-01C0-4A83-827D-31F477C0359B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*", + "matchCriteriaId": "6C826F67-CA6D-4DA4-B5E9-9F4FEFE3D6D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*", + "matchCriteriaId": "D5666E87-F0CB-45FA-9AED-C7A0F383A559" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1EA45D5C-199D-44A1-90B1-1157F899A01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "06C1FB6A-E829-4FF3-B206-8877C9747DB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "F3A3BF88-7014-440D-8AC2-FB42A779F489" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "777E9236-AD46-484F-BC22-7F74AB6261F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "4D308A1E-5364-483D-AB82-8269D576CEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:*", + "matchCriteriaId": "93078B0C-2CA2-4A9C-A740-9947074F837C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p1:*:*:*:*:*:*", + "matchCriteriaId": "A6993EAC-AC35-4E5F-AF40-8E105CC0B34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p10:*:*:*:*:*:*", + "matchCriteriaId": "1B0B829D-2160-4927-8896-C02D9593D9B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p12:*:*:*:*:*:*", + "matchCriteriaId": "87D5CC07-6D6C-4015-8EFA-D6A107E2E311" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p13:*:*:*:*:*:*", + "matchCriteriaId": "DA0358B5-0CD5-484D-AEAB-15B757F8DCC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p14:*:*:*:*:*:*", + "matchCriteriaId": "7932D1B4-CCC3-425E-B7D4-DD55331B0BCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p15:*:*:*:*:*:*", + "matchCriteriaId": "86F07F8F-DA28-4905-B04E-303D4CF1430A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p16:*:*:*:*:*:*", + "matchCriteriaId": "816C8B21-94CD-4BC5-B425-0343FB4148B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p2:*:*:*:*:*:*", + "matchCriteriaId": "6F7B4C7E-ACD2-4450-A179-4526DF58DDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p3:*:*:*:*:*:*", + "matchCriteriaId": "75D904EC-C9CD-438B-B9BE-B4B4C370761C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p4:*:*:*:*:*:*", + "matchCriteriaId": "71B49898-6E1C-4629-832C-787B8B205403" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p5:*:*:*:*:*:*", + "matchCriteriaId": "250A24F5-FE83-488C-9D07-C35E6D718BFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p6:*:*:*:*:*:*", + "matchCriteriaId": "55D7B8E3-25CB-4AEB-BF1B-EA115A19E762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p7:*:*:*:*:*:*", + "matchCriteriaId": "FCEDB8D4-E96C-430C-AEFD-F20D25AAD097" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p8:*:*:*:*:*:*", + "matchCriteriaId": "E644315A-04C5-45AB-A814-BB5A6B8C93D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:p9:*:*:*:*:*:*", + "matchCriteriaId": "C666F892-19C7-4351-ACD1-A48048F2F234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "52DBF406-9C77-4DDA-AB7D-40FAE40023D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "6E04B0A6-E6AD-4C44-BEED-7BB7EC58A0A8" } ] } @@ -90,6 +240,20 @@ } ], "references": [ + { + "url": "http://osvdb.org/50137", + "source": "secteam@freebsd.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/32871", + "source": "secteam@freebsd.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:11.arc4random.asc", "source": "secteam@freebsd.org", @@ -99,11 +263,21 @@ }, { "url": "http://securitytracker.com/id?1021276", - "source": "secteam@freebsd.org" + "source": "secteam@freebsd.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/32447", - "source": "secteam@freebsd.org" + "source": "secteam@freebsd.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-51xx/CVE-2008-5177.json b/CVE-2008/CVE-2008-51xx/CVE-2008-5177.json index cb3a9034604..5da22ae00dc 100644 --- a/CVE-2008/CVE-2008-51xx/CVE-2008-5177.json +++ b/CVE-2008/CVE-2008-51xx/CVE-2008-5177.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5177", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-20T15:30:00.313", - "lastModified": "2017-08-08T01:33:09.327", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorImpact": "http://www.insight-tech.org/index.php?p=Yosemite-backup-8-7-DtbClsLogin-Buffer-Overflow-Vulnerability\r\n\r\n\"There exists a vulnerability within a function in Yosemite Backup 8.7 which leads to remote compromise of the vulnerable system if properly exploited.\r\nThe vulnerability affects both Linux/Windows versions of Yosemite Backup 8.7.\"", "descriptions": [ @@ -72,19 +72,36 @@ } ], "references": [ + { + "url": "http://osvdb.org/49743", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/49744", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/32262", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.insight-tech.org/index.php?p=Yosemite-backup-8-7-DtbClsLogin-Buffer-Overflow-Vulnerability", "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { "url": "http://www.insight-tech.org/xploits/yosemiteStackOverflowExploit.zip", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-53xx/CVE-2008-5399.json b/CVE-2008/CVE-2008-53xx/CVE-2008-5399.json index 3010f44cf97..cf99e948fc2 100644 --- a/CVE-2008/CVE-2008-53xx/CVE-2008-5399.json +++ b/CVE-2008/CVE-2008-53xx/CVE-2008-5399.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5399", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-10T06:44:41.817", - "lastModified": "2023-11-07T02:03:06.993", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -138,7 +138,10 @@ }, { "url": "http://www.mvnforum.com/mvnforum/viewthread_thread%2C4361", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/498872/100/0/threaded", diff --git a/CVE-2008/CVE-2008-54xx/CVE-2008-5400.json b/CVE-2008/CVE-2008-54xx/CVE-2008-5400.json index d8f336cb2c7..92202acb743 100644 --- a/CVE-2008/CVE-2008-54xx/CVE-2008-5400.json +++ b/CVE-2008/CVE-2008-54xx/CVE-2008-5400.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5400", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-10T06:44:41.830", - "lastModified": "2023-11-07T02:03:07.083", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -192,7 +192,10 @@ }, { "url": "http://www.mvnforum.com/mvnforum/viewthread_thread%2C4361", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/498872/100/0/threaded", diff --git a/CVE-2008/CVE-2008-55xx/CVE-2008-5583.json b/CVE-2008/CVE-2008-55xx/CVE-2008-5583.json index 4210e6809d3..afa8ffe2af6 100644 --- a/CVE-2008/CVE-2008-55xx/CVE-2008-5583.json +++ b/CVE-2008/CVE-2008-55xx/CVE-2008-5583.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5583", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-15T18:00:00.733", - "lastModified": "2018-10-11T20:56:12.740", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/29016", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4734", "source": "cve@mitre.org" @@ -81,7 +88,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-55xx/CVE-2008-5584.json b/CVE-2008/CVE-2008-55xx/CVE-2008-5584.json index 1bebdec20cd..8175cdab38d 100644 --- a/CVE-2008/CVE-2008-55xx/CVE-2008-5584.json +++ b/CVE-2008/CVE-2008-55xx/CVE-2008-5584.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5584", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-15T18:00:00.750", - "lastModified": "2018-10-11T20:56:13.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/29016", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4734", "source": "cve@mitre.org" @@ -81,7 +88,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-56xx/CVE-2008-5664.json b/CVE-2008/CVE-2008-56xx/CVE-2008-5664.json index dc16f53d56c..ce4b6ff1786 100644 --- a/CVE-2008/CVE-2008-56xx/CVE-2008-5664.json +++ b/CVE-2008/CVE-2008-56xx/CVE-2008-5664.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5664", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-19T01:52:02.437", - "lastModified": "2017-09-29T01:32:43.993", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,17 @@ } ], "references": [ + { + "url": "http://osvdb.org/50715", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/33183", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4783", "source": "cve@mitre.org" @@ -86,7 +97,8 @@ "url": "http://www.shinnai.net/xplits/TXT_n7dMz2jBQsDJFtplslYw.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-56xx/CVE-2008-5694.json b/CVE-2008/CVE-2008-56xx/CVE-2008-5694.json index 7634cc2776c..ceb8ab613ba 100644 --- a/CVE-2008/CVE-2008-56xx/CVE-2008-5694.json +++ b/CVE-2008/CVE-2008-56xx/CVE-2008-5694.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5694", "sourceIdentifier": "cve@mitre.org", "published": "2008-12-19T18:30:00.453", - "lastModified": "2018-10-11T20:56:29.977", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,10 @@ "references": [ { "url": "http://www.by-f10.com/bug.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/487903/100/200/threaded", diff --git a/CVE-2008/CVE-2008-58xx/CVE-2008-5848.json b/CVE-2008/CVE-2008-58xx/CVE-2008-5848.json index 6c8ed4ed328..41dd88fd7d6 100644 --- a/CVE-2008/CVE-2008-58xx/CVE-2008-5848.json +++ b/CVE-2008/CVE-2008-58xx/CVE-2008-5848.json @@ -2,7 +2,7 @@ "id": "CVE-2008-5848", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-06T17:30:00.267", - "lastModified": "2009-05-20T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -142,7 +142,10 @@ "references": [ { "url": "http://ruxcon.org.au/files/2008/SIFT-Ruxcon2008-SCADA-Hacking-Modbus-Enabled-Devices.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://support.advantech.com.tw/support/DownloadSRDetail.aspx?SR_ID=1-95WMW", @@ -150,7 +153,10 @@ }, { "url": "http://www.ruxcon.org.au/presentations.shtml#13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-60xx/CVE-2008-6058.json b/CVE-2008/CVE-2008-60xx/CVE-2008-6058.json index 30dd7cdc41c..6708877bd7f 100644 --- a/CVE-2008/CVE-2008-60xx/CVE-2008-6058.json +++ b/CVE-2008/CVE-2008-60xx/CVE-2008-6058.json @@ -2,7 +2,7 @@ "id": "CVE-2008-6058", "sourceIdentifier": "cve@mitre.org", "published": "2009-02-05T00:30:00.233", - "lastModified": "2009-02-05T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -132,9 +132,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33566", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.princeofnigeria.org/blogs/index.php/2009/01/15/syslserve-1-058-denial-of-service-vulner", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/33311", diff --git a/CVE-2008/CVE-2008-60xx/CVE-2008-6075.json b/CVE-2008/CVE-2008-60xx/CVE-2008-6075.json index f5867b99eb4..69e9fa7c967 100644 --- a/CVE-2008/CVE-2008-60xx/CVE-2008-6075.json +++ b/CVE-2008/CVE-2008-60xx/CVE-2008-6075.json @@ -2,7 +2,7 @@ "id": "CVE-2008-6075", "sourceIdentifier": "cve@mitre.org", "published": "2009-02-06T11:30:00.250", - "lastModified": "2017-08-08T01:33:43.110", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ "references": [ { "url": "http://www.rasihbahar.com/download/down.asp?id=479", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/31852", diff --git a/CVE-2008/CVE-2008-61xx/CVE-2008-6157.json b/CVE-2008/CVE-2008-61xx/CVE-2008-6157.json index ea0d7399b0b..02ed503f629 100644 --- a/CVE-2008/CVE-2008-61xx/CVE-2008-6157.json +++ b/CVE-2008/CVE-2008-61xx/CVE-2008-6157.json @@ -2,8 +2,8 @@ "id": "CVE-2008-6157", "sourceIdentifier": "cve@mitre.org", "published": "2009-02-17T17:30:05.843", - "lastModified": "2017-10-19T01:30:16.237", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:32:02.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-312" } ] } @@ -73,15 +95,26 @@ "references": [ { "url": "http://www.attrition.org/pipermail/vim/2009-February/002146.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48822", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/7613", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-65xx/CVE-2008-6534.json b/CVE-2008/CVE-2008-65xx/CVE-2008-6534.json index 1f2a0009a3f..2d97943d1fa 100644 --- a/CVE-2008/CVE-2008-65xx/CVE-2008-6534.json +++ b/CVE-2008/CVE-2008-65xx/CVE-2008-6534.json @@ -2,7 +2,7 @@ "id": "CVE-2008-6534", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-26T21:00:00.437", - "lastModified": "2017-09-29T01:33:13.683", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,10 +76,21 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/32999", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://vuln.sg/nullftpserver1107-en.html", "source": "cve@mitre.org" }, + { + "url": "http://www.osvdb.org/50486", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/32656", "source": "cve@mitre.org" @@ -93,7 +104,10 @@ }, { "url": "http://www.vwsolutions.com/knowledgeBase/releaseNotes.aspx?productId=14", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47099", diff --git a/CVE-2008/CVE-2008-66xx/CVE-2008-6664.json b/CVE-2008/CVE-2008-66xx/CVE-2008-6664.json index 57288ab7839..30753361d98 100644 --- a/CVE-2008/CVE-2008-66xx/CVE-2008-6664.json +++ b/CVE-2008/CVE-2008-66xx/CVE-2008-6664.json @@ -2,7 +2,7 @@ "id": "CVE-2008-6664", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-08T10:30:00.203", - "lastModified": "2017-09-29T01:33:16.997", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,8 @@ "url": "http://www.shnews.de/change-log", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2008/CVE-2008-68xx/CVE-2008-6828.json b/CVE-2008/CVE-2008-68xx/CVE-2008-6828.json index 5b71ac9741f..04d6eb8af9e 100644 --- a/CVE-2008/CVE-2008-68xx/CVE-2008-6828.json +++ b/CVE-2008/CVE-2008-68xx/CVE-2008-6828.json @@ -2,8 +2,8 @@ "id": "CVE-2008-6828", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-08T19:30:00.233", - "lastModified": "2017-08-17T01:29:36.067", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:20:05.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-312" } ] } @@ -63,88 +85,13 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:*:*:*:*:*:*:*:*", - "versionEndIncluding": "6.9.355", - "matchCriteriaId": "03E880BF-21F8-48ED-8C3B-30C1924F92A2" + "versionEndExcluding": "6.9.355", + "matchCriteriaId": "D0E5D393-D973-4AFA-AF0C-F0E63DC5AE32" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6:*:*:*:*:*:*:*", - "matchCriteriaId": "84C46569-313C-46F9-A7AE-62588A41E468" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6:sp1:*:*:*:*:*:*", - "matchCriteriaId": "2E3E772A-0E92-4F6D-88A2-8DBAC5DF7745" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6:sp2:*:*:*:*:*:*", - "matchCriteriaId": "AB2B3DE9-F9BF-4351-9EC4-A599D57CBDD3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D8B38C75-7D5A-47ED-A59D-2E5798325C13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.5.248:*:*:*:*:*:*:*", - "matchCriteriaId": "FF1EB7F9-0268-4969-A907-D6859962CE7F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.5.299:*:*:*:*:*:*:*", - "matchCriteriaId": "C3AA5883-D184-490E-BFA4-3B329C1A843E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "6F838B26-BCE1-4663-95B1-B40BAB4F614E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp1:*:*:*:*:*:*", - "matchCriteriaId": "A1363995-0647-4C83-B3DA-360D5433DCA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp2:*:*:*:*:*:*", - "matchCriteriaId": "9834A783-AB15-489F-A146-0D0D5A9DB5E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8.282:*:*:*:*:*:*:*", - "matchCriteriaId": "A9E968DE-D137-467D-9800-7E00D69BA3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8.378:*:*:*:*:*:*:*", - "matchCriteriaId": "57F30D89-6939-4BE7-B1FA-2F3C3CD6989D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8.380:*:*:*:*:*:*:*", - "matchCriteriaId": "66BB840E-08C0-443A-A4B4-CAAF476AB728" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.8.380.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1BE8C69C-6604-4244-9634-D8D1CE2B3AEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F0002047-0965-4086-A5E6-AEC02200B6CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.164:*:*:*:*:*:*:*", - "matchCriteriaId": "BA744B2A-B81E-4E97-A720-307041478B97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.176:*:*:*:*:*:*:*", - "matchCriteriaId": "E9301CFC-5925-4249-8439-5E2BBAF06687" + "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:-:*:*:*:*:*:*", + "matchCriteriaId": "679093B0-ECFF-4923-827F-7DBE8458C56A" } ] } @@ -152,33 +99,57 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31773", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.10.20b.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/31767", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1021072", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2876", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46007", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-70xx/CVE-2008-7064.json b/CVE-2008/CVE-2008-70xx/CVE-2008-7064.json index 105c2dcdb5f..a90547af847 100644 --- a/CVE-2008/CVE-2008-70xx/CVE-2008-7064.json +++ b/CVE-2008/CVE-2008-70xx/CVE-2008-7064.json @@ -2,7 +2,7 @@ "id": "CVE-2008-7064", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-25T10:30:00.280", - "lastModified": "2017-09-29T01:33:30.357", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,9 +72,27 @@ ], "references": [ { - "url": "http://www.qsfportal.com/index.php?a=newspost&t=191", + "url": "http://osvdb.org/50143", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/32823", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/38670", + "source": "cve@mitre.org" + }, + { + "url": "http://www.qsfportal.com/index.php?a=newspost&t=191", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/32452", "source": "cve@mitre.org", diff --git a/CVE-2009/CVE-2009-00xx/CVE-2009-0072.json b/CVE-2009/CVE-2009-00xx/CVE-2009-0072.json index a1ffb9708f3..23da2c3f018 100644 --- a/CVE-2009/CVE-2009-00xx/CVE-2009-0072.json +++ b/CVE-2009/CVE-2009-00xx/CVE-2009-0072.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0072", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-08T19:30:11.313", - "lastModified": "2017-08-08T01:33:47.390", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,10 @@ "references": [ { "url": "http://skypher.com/index.php/2009/01/07/msie-screen-null-ptr-dos-details/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/33149", diff --git a/CVE-2009/CVE-2009-01xx/CVE-2009-0152.json b/CVE-2009/CVE-2009-01xx/CVE-2009-0152.json index d1e2c3ec68f..01e36df588d 100644 --- a/CVE-2009/CVE-2009-01xx/CVE-2009-0152.json +++ b/CVE-2009/CVE-2009-01xx/CVE-2009-0152.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0152", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-13T15:30:00.327", - "lastModified": "2017-08-08T01:33:48.187", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:19:55.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-16" + "value": "CWE-312" } ] } @@ -62,73 +84,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DC90AA12-DD17-4607-90CB-E342E83F20BB" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.5.0", + "versionEndExcluding": "10.5.7", + "matchCriteriaId": "14EDAEBB-D669-4439-A088-7A7AB31C98FB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "855288F1-0242-4951-AB3F-B7AF13E21CF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "10082781-B93E-4B84-94F2-FA9749B4D92B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "AE1EBF04-C440-4A6B-93F2-DC3A812728C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DFB077A2-927B-43AF-BFD5-0E78648C9394" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C7817232-BE3E-4655-8282-A979E5D40D3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "77E8D614-E1EE-42F1-9E55-EA54FB500621" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C73BED9E-29FB-4965-B38F-013FFE5A9170" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D3B7DEC3-1C0B-4D13-98CD-CB7FAE7933B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7723A9E8-1DE2-4C7D-81E6-4F79DCB09324" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C147E866-B80F-4FFA-BBE8-19E84A46DB1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8EC681A4-6F58-4C7D-B4E0-FCC1BCBC534E" + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.5.0", + "versionEndExcluding": "10.5.7", + "matchCriteriaId": "7F269296-49E2-41A2-893B-7A03B0008C4C" } ] } @@ -140,10 +106,18 @@ "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch", "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/35074", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://support.apple.com/kb/HT3549", "source": "cve@mitre.org", @@ -154,26 +128,44 @@ }, { "url": "http://www.securityfocus.com/bid/34926", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1022212", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1297", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50487", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0210.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0210.json index 7325c45308c..7b13845f822 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0210.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0210.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0210", "sourceIdentifier": "cret@cert.org", "published": "2009-02-08T22:30:00.233", - "lastModified": "2018-10-11T21:00:57.037", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "Per http://www.kb.cert.org/vuls/id/337569 \r\n\r\n\"III. Solution \r\n\r\nApply Patch Users of e-terrahabitat version 5.5, 5.6, and 5.7 should apply the e-terrahabitat_560_P20081030_SEC patch immediately.\"", "descriptions": [ @@ -83,6 +83,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33837", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/337569", "source": "cret@cert.org", @@ -92,7 +96,10 @@ }, { "url": "http://www.scada-security.com/vulnerabilities/areva1.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0211.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0211.json index 954d0b90a56..5101ee54bf8 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0211.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0211.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0211", "sourceIdentifier": "cret@cert.org", "published": "2009-02-08T22:30:00.280", - "lastModified": "2018-10-11T21:00:57.410", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33837", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/337569", "source": "cret@cert.org", @@ -91,7 +95,10 @@ }, { "url": "http://www.scada-security.com/vulnerabilities/areva1.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0212.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0212.json index 6532952b96d..33886c6b811 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0212.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0212.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0212", "sourceIdentifier": "cret@cert.org", "published": "2009-02-08T22:30:00.297", - "lastModified": "2018-10-11T21:00:57.787", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "Per http://www.kb.cert.org/vuls/id/337569 \r\n\r\n\"III. Solution\r\n\r\n Apply Patch Users of e-terrahabitat version 5.5, 5.6, and 5.7 should apply the e-terrahabitat_560_P20081030_SEC patch immediately.\"", "descriptions": [ @@ -83,6 +83,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33837", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/337569", "source": "cret@cert.org", @@ -92,7 +96,10 @@ }, { "url": "http://www.scada-security.com/vulnerabilities/areva1.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0213.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0213.json index e5ff83126ad..cf5e4241f2c 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0213.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0213.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0213", "sourceIdentifier": "cret@cert.org", "published": "2009-02-08T22:30:00.313", - "lastModified": "2018-10-11T21:00:58.160", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "Per http://www.kb.cert.org/vuls/id/337569\r\n\r\n\r\n\"III. Solution\r\nApply Patch\r\n\r\n\r\nUsers of e-terrahabitat version 5.5, 5.6, and 5.7 should apply the e-terrahabitat_560_P20081030_SEC patch immediately.\"", "descriptions": [ @@ -83,6 +83,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33837", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/337569", "source": "cret@cert.org", @@ -92,7 +96,10 @@ }, { "url": "http://www.scada-security.com/vulnerabilities/areva1.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0214.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0214.json index 60bf27dc2f0..699d34f2d79 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0214.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0214.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0214", "sourceIdentifier": "cret@cert.org", "published": "2009-02-08T22:30:00.343", - "lastModified": "2018-10-11T21:00:58.537", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorSolution": "Per http://www.kb.cert.org/vuls/id/337569 \r\n\r\n\"III. Solution \r\n\r\nApply Patch Users of e-terrahabitat version 5.5, 5.6, and 5.7 should apply the e-terrahabitat_560_P20081030_SEC patch immediately.\"", "descriptions": [ @@ -83,6 +83,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33837", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/337569", "source": "cret@cert.org", @@ -92,7 +96,10 @@ }, { "url": "http://www.scada-security.com/vulnerabilities/areva1.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0255.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0255.json index af2e8f5e2e4..f0c513ae3cd 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0255.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0255.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0255", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-22T23:30:00.203", - "lastModified": "2017-08-08T01:33:51.500", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:10:04.203", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-330" } ] } @@ -62,123 +84,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "25EAE65C-1E17-48CD-B48C-E0BC09FB6596" + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.0.10", + "matchCriteriaId": "FCD45EC2-1866-4CFC-B841-8B0B879B5565" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "501A9157-044A-4856-8092-418D7329EED3" + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.8", + "matchCriteriaId": "EB66C8C2-1FAE-4C54-9284-A940CBEDBC00" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4EA47174-9BC4-4B74-8618-6A7B0773553B" - }, + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.4", + "matchCriteriaId": "BBFEC718-5811-4B4D-96CF-A37488974D4A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5A13146E-EC04-4354-9123-BC7CB292C66A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8F27B173-8D10-47F7-8450-F8808A918295" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0D1FAD0A-6B98-476B-BCD2-361996CA1C36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "AE992D57-AF82-4BF0-96E8-98110C0AEBF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "7A9A484F-C34D-4885-8125-D9C8725EEB4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "DCCB2DE6-4407-4E40-8574-9C813183565B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "E19647A4-C422-42D0-863B-5B6E0B08BFAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "AC2F89D7-D34C-4ADD-8A9E-34C37122C3C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "273F2E33-0655-46DE-9397-E16658B4BD8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "3B8F7039-4117-4D53-ABE8-99C10518D351" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "161E310F-F2D8-40B3-8390-8C52ACDD0B72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F6B33D32-4D59-4768-A2C6-9DC7CD30F5E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4679B5DF-25FA-40E9-A322-DF1FF1BC7E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "96D69530-AE74-4012-B522-01D0B6B01662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5514D17F-95A5-48C5-9F91-554F8D3C3DF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E46E35EC-FF7B-4510-A5F2-FC230B7477B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "5A671ED2-91AA-4447-8996-A8A16FE753A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D93919E9-B3E8-483E-A701-D87570127207" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F6B1326B-CB9E-4B40-85BD-05AF52E6A1D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FDDEAF6A-8A99-4872-98CC-12BD54515B07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8D8185B9-D244-43B3-9DF1-FF137A2108DD" + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" } ] } @@ -186,6 +124,22 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33617", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/33679", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/", "source": "cve@mitre.org", @@ -195,15 +149,27 @@ }, { "url": "http://www.debian.org/security/2009/dsa-1711", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/33376", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48132", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0284.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0284.json index e9c26dc954e..0745857197d 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0284.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0284.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0284", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-27T18:30:00.420", - "lastModified": "2017-09-29T01:33:43.560", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,9 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33625", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.flaxweb.com/products/articles", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/33422", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0288.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0288.json index 8d1cb064c56..645e3402864 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0288.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0288.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0288", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-27T19:30:00.280", - "lastModified": "2018-10-11T21:01:10.630", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33561", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://sourceforge.net/forum/forum.php?forum_id=894598", "source": "cve@mitre.org", @@ -85,7 +92,10 @@ }, { "url": "http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-directory-traversal", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500106/100/0/threaded", diff --git a/CVE-2009/CVE-2009-02xx/CVE-2009-0289.json b/CVE-2009/CVE-2009-02xx/CVE-2009-0289.json index 318907e3e6e..945bf7a8626 100644 --- a/CVE-2009/CVE-2009-02xx/CVE-2009-0289.json +++ b/CVE-2009/CVE-2009-02xx/CVE-2009-0289.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0289", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-27T19:30:02.297", - "lastModified": "2018-10-11T21:01:11.130", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,7 +85,10 @@ }, { "url": "http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-server-denial-of-servi?blog=1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/500107/100/0/threaded", diff --git a/CVE-2009/CVE-2009-03xx/CVE-2009-0325.json b/CVE-2009/CVE-2009-03xx/CVE-2009-0325.json index 728184af240..d039b241351 100644 --- a/CVE-2009/CVE-2009-03xx/CVE-2009-0325.json +++ b/CVE-2009/CVE-2009-03xx/CVE-2009-0325.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0325", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-29T18:30:02.420", - "lastModified": "2017-09-29T01:33:44.827", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,9 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/33573", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.push55.co.uk/index.php?s=ad&id=6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/33351", @@ -90,7 +100,8 @@ "url": "https://www.push55.co.uk/poclibrary/ninjadesignscouk-1.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2009/CVE-2009-03xx/CVE-2009-0327.json b/CVE-2009/CVE-2009-03xx/CVE-2009-0327.json index 8bf429748e4..90327fecbd4 100644 --- a/CVE-2009/CVE-2009-03xx/CVE-2009-0327.json +++ b/CVE-2009/CVE-2009-03xx/CVE-2009-0327.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0327", "sourceIdentifier": "cve@mitre.org", "published": "2009-01-29T18:30:02.467", - "lastModified": "2017-09-29T01:33:44.887", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,6 +75,13 @@ "url": "http://freshmeat.net/projects/freebiblesearch/?branch_id=77256&release_id=292446", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/33595", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/33301", "source": "cve@mitre.org", @@ -84,7 +91,10 @@ }, { "url": "http://www.seraphimtech.net/repository/Changes.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://www.exploit-db.com/exploits/7798", diff --git a/CVE-2009/CVE-2009-03xx/CVE-2009-0383.json b/CVE-2009/CVE-2009-03xx/CVE-2009-0383.json index 6cb0a0f49bd..d09381c675c 100644 --- a/CVE-2009/CVE-2009-03xx/CVE-2009-0383.json +++ b/CVE-2009/CVE-2009-03xx/CVE-2009-0383.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0383", "sourceIdentifier": "cve@mitre.org", "published": "2009-02-02T19:30:00.267", - "lastModified": "2017-09-29T01:33:47.403", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,13 +72,26 @@ ], "references": [ { - "url": "http://www.mzbservices.com/show_post.php?id=72", + "url": "http://osvdb.org/51482", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/33590", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, + { + "url": "http://www.mzbservices.com/show_post.php?id=72", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory", + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/33368", "source": "cve@mitre.org" diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0553.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0553.json index 8dae5c04490..55ba7633c5b 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0553.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0553.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0553", "sourceIdentifier": "secure@microsoft.com", "published": "2009-04-15T08:00:00.670", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -257,7 +257,10 @@ }, { "url": "http://skypher.com/index.php/2009/04/19/ms09-014-embed-element-memory-corruption/", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm", diff --git a/CVE-2009/CVE-2009-08xx/CVE-2009-0817.json b/CVE-2009/CVE-2009-08xx/CVE-2009-0817.json index 0260da0fe43..634a33b3f7e 100644 --- a/CVE-2009/CVE-2009-08xx/CVE-2009-0817.json +++ b/CVE-2009/CVE-2009-08xx/CVE-2009-0817.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0817", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-05T02:30:00.610", - "lastModified": "2017-08-17T01:30:02.147", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -151,7 +151,19 @@ "url": "http://lampsecurity.org/node/28", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/52300", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/34060", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2009/CVE-2009-08xx/CVE-2009-0849.json b/CVE-2009/CVE-2009-08xx/CVE-2009-0849.json index feb41e0103a..603cc08490e 100644 --- a/CVE-2009/CVE-2009-08xx/CVE-2009-0849.json +++ b/CVE-2009/CVE-2009-08xx/CVE-2009-0849.json @@ -2,7 +2,7 @@ "id": "CVE-2009-0849", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-09T17:30:00.170", - "lastModified": "2017-08-17T01:30:03.147", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorComment": "Per: http://secunia.com/advisories/34024\r\n\r\nSuccessful exploitation allows to crash the application on a Windows system and reportedly allows to execute arbitrary code on a Linux system.", "descriptions": [ @@ -96,9 +96,27 @@ ], "references": [ { - "url": "http://www.insight-tech.org/index.php?p=NovaNET-12-Remote-Buffer-Oveflow", + "url": "http://osvdb.org/52301", "source": "cve@mitre.org" }, + { + "url": "http://osvdb.org/52302", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/34024", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.insight-tech.org/index.php?p=NovaNET-12-Remote-Buffer-Oveflow", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/33954", "source": "cve@mitre.org", diff --git a/CVE-2009/CVE-2009-09xx/CVE-2009-0964.json b/CVE-2009/CVE-2009-09xx/CVE-2009-0964.json index 657bc206083..2ed6b9cd7c1 100644 --- a/CVE-2009/CVE-2009-09xx/CVE-2009-0964.json +++ b/CVE-2009/CVE-2009-09xx/CVE-2009-0964.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0964", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-19T10:30:00.467", - "lastModified": "2018-10-10T19:32:39.990", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:19:38.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-255" + "value": "CWE-312" } ] } @@ -65,11 +87,6 @@ "criteria": "cpe:2.3:a:xlinesoft:phprunner:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.2", "matchCriteriaId": "4E275FB1-EFD7-4AA2-88CB-A5F3D165DE03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xlinesoft:phprunner:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0DBC4CF9-4F07-4439-81AB-BFE0D55A24B2" } ] } @@ -77,28 +94,53 @@ } ], "references": [ + { + "url": "http://osvdb.org/52804", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.bugreport.ir/index_63.htm", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, { "url": "http://www.securityfocus.com/archive/1/501894/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/0750", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49279", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/8226", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-10xx/CVE-2009-1066.json b/CVE-2009/CVE-2009-10xx/CVE-2009-1066.json index b822bc8d37b..417a3afd284 100644 --- a/CVE-2009/CVE-2009-10xx/CVE-2009-1066.json +++ b/CVE-2009/CVE-2009-10xx/CVE-2009-1066.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1066", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-26T05:51:52.500", - "lastModified": "2017-09-29T01:34:08.827", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,19 @@ "url": "http://lampsecurity.org/Pixie-CMS-Multiple-Vulnerabilities", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/52833", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/34364", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2009/CVE-2009-10xx/CVE-2009-1067.json b/CVE-2009/CVE-2009-10xx/CVE-2009-1067.json index 3e201ebc4b3..a73225e8f18 100644 --- a/CVE-2009/CVE-2009-10xx/CVE-2009-1067.json +++ b/CVE-2009/CVE-2009-10xx/CVE-2009-1067.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1067", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-26T05:51:52.530", - "lastModified": "2017-09-29T01:34:08.873", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,10 +78,25 @@ { "url": "http://lampsecurity.org/Pixie-CMS-Multiple-Vulnerabilities", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/52832", + "source": "cve@mitre.org", "tags": [ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/34364", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/34189", "source": "cve@mitre.org", diff --git a/CVE-2009/CVE-2009-13xx/CVE-2009-1334.json b/CVE-2009/CVE-2009-13xx/CVE-2009-1334.json index 94350649734..df635ce4a62 100644 --- a/CVE-2009/CVE-2009-13xx/CVE-2009-1334.json +++ b/CVE-2009/CVE-2009-13xx/CVE-2009-1334.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1334", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-17T14:30:00.687", - "lastModified": "2017-08-17T01:30:17.583", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/34646", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1022060", "source": "cve@mitre.org", @@ -81,6 +88,14 @@ { "url": "http://www.insight-tech.org/index.php?p=IBM-Tivoli-Continuous-Data-Protection-for-Files-version-3-1-4-0---XSS", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/53651", + "source": "cve@mitre.org", "tags": [ "Exploit" ] diff --git a/CVE-2009/CVE-2009-14xx/CVE-2009-1466.json b/CVE-2009/CVE-2009-14xx/CVE-2009-1466.json index d1425d160c4..1d99fb63f39 100644 --- a/CVE-2009/CVE-2009-14xx/CVE-2009-1466.json +++ b/CVE-2009/CVE-2009-14xx/CVE-2009-1466.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1466", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-14T17:30:00.640", - "lastModified": "2018-10-10T19:36:59.407", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:20:00.187", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-312" } ] } @@ -73,23 +95,45 @@ "references": [ { "url": "http://securitytracker.com/id?1022204", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/503434/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/34911", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.syhunt.com/advisories/?id=aas-multiple", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50590", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-15xx/CVE-2009-1517.json b/CVE-2009/CVE-2009-15xx/CVE-2009-1517.json index 14d832058fa..9ef78fd1004 100644 --- a/CVE-2009/CVE-2009-15xx/CVE-2009-1517.json +++ b/CVE-2009/CVE-2009-15xx/CVE-2009-1517.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1517", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-04T18:30:00.377", - "lastModified": "2017-09-29T01:34:24.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,8 @@ "url": "http://www.shinnai.net/xplits/TXT_Gl6RHStS23c9DANArcJE.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-16xx/CVE-2009-1603.json b/CVE-2009/CVE-2009-16xx/CVE-2009-1603.json index bc230b6334e..f5bada98b9a 100644 --- a/CVE-2009/CVE-2009-16xx/CVE-2009-1603.json +++ b/CVE-2009/CVE-2009-16xx/CVE-2009-1603.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1603", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-11T16:30:00.187", - "lastModified": "2009-08-08T05:26:21.250", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:19:47.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-312" } ] } @@ -68,47 +90,125 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", + "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", + "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", + "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824" + } + ] + } + ] } ], "references": [ + { + "url": "http://secunia.com/advisories/35035", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35293", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/35309", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36074", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://security.gentoo.org/glsa/glsa-200908-01.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:123", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.opensc-project.org/pipermail/opensc-announce/2009-May/000025.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/05/08/1", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1295", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00095.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00097.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01420.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01432.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-16xx/CVE-2009-1639.json b/CVE-2009/CVE-2009-16xx/CVE-2009-1639.json index ea74884912d..534cfd4597c 100644 --- a/CVE-2009/CVE-2009-16xx/CVE-2009-1639.json +++ b/CVE-2009/CVE-2009-16xx/CVE-2009-1639.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1639", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-15T15:30:00.267", - "lastModified": "2023-11-07T02:03:58.197", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,12 +82,16 @@ "url": "http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Novell-Traditional-volumes-v-4-03-Code-Execution-and-DoS", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://www.insight-tech.org/xploits/KernelrecoveryforNovell%28Traditionalvolumes%29v.4.03CodeExecutionandDoS.py", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/34846", diff --git a/CVE-2009/CVE-2009-16xx/CVE-2009-1640.json b/CVE-2009/CVE-2009-16xx/CVE-2009-1640.json index 6276922f21d..83247c96aae 100644 --- a/CVE-2009/CVE-2009-16xx/CVE-2009-1640.json +++ b/CVE-2009/CVE-2009-16xx/CVE-2009-1640.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1640", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-15T15:30:00.280", - "lastModified": "2017-08-17T01:30:26.770", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,14 +72,29 @@ ], "references": [ { - "url": "http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Macintosh-v-4-04-Buffer-Overflow", + "url": "http://osvdb.org/54224", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/34860", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.insight-tech.org/index.php?p=Kernel-recovery-for-Macintosh-v-4-04-Buffer-Overflow", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.insight-tech.org/xploits/KernelrecoveryforMacintoshv.4.04BufferOverflow.py", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-16xx/CVE-2009-1671.json b/CVE-2009/CVE-2009-16xx/CVE-2009-1671.json index c76be151060..36b548ec07c 100644 --- a/CVE-2009/CVE-2009-16xx/CVE-2009-1671.json +++ b/CVE-2009/CVE-2009-16xx/CVE-2009-1671.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1671", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-18T18:30:01.017", - "lastModified": "2017-09-29T01:34:30.467", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,8 @@ "url": "http://www.shinnai.net/xplits/TXT_mhxRKrtrPLyAHRFNm7QR.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-16xx/CVE-2009-1672.json b/CVE-2009/CVE-2009-16xx/CVE-2009-1672.json index 3e6a54de689..58c27a6273d 100644 --- a/CVE-2009/CVE-2009-16xx/CVE-2009-1672.json +++ b/CVE-2009/CVE-2009-16xx/CVE-2009-1672.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1672", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-18T18:30:01.047", - "lastModified": "2017-09-29T01:34:30.530", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,8 @@ "url": "http://www.shinnai.net/xplits/TXT_mhxRKrtrPLyAHRFNm7QR.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-17xx/CVE-2009-1730.json b/CVE-2009/CVE-2009-17xx/CVE-2009-1730.json index f49e2cb7a01..a2b2a2dc289 100644 --- a/CVE-2009/CVE-2009-17xx/CVE-2009-1730.json +++ b/CVE-2009/CVE-2009-17xx/CVE-2009-1730.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1730", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-20T18:30:00.377", - "lastModified": "2017-08-17T01:30:28.770", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,9 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/35131", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.princeofnigeria.org/blogs/index.php/2009/05/17/netdecision-tftp-server-4-2-tftp-directo?blog=1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/35002", diff --git a/CVE-2009/CVE-2009-17xx/CVE-2009-1775.json b/CVE-2009/CVE-2009-17xx/CVE-2009-1775.json index f0751df134f..33e8de47582 100644 --- a/CVE-2009/CVE-2009-17xx/CVE-2009-1775.json +++ b/CVE-2009/CVE-2009-17xx/CVE-2009-1775.json @@ -2,7 +2,7 @@ "id": "CVE-2009-1775", "sourceIdentifier": "cve@mitre.org", "published": "2009-05-22T20:30:00.717", - "lastModified": "2009-06-30T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -71,9 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/34923", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.insight-tech.org/index.php?p=Ulteo-Open-Virtual-Desktop-v1-0-multiple-XSS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/34927", diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2011.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2011.json index 94827cc1f56..173f8032b7f 100644 --- a/CVE-2009/CVE-2009-20xx/CVE-2009-2011.json +++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2011.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2011", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-16T21:00:00.390", - "lastModified": "2018-10-10T19:39:15.240", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -94,6 +94,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/35402", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.coresecurity.com/content/DXStudio-player-firefox-plugin", "source": "cve@mitre.org", @@ -103,7 +110,10 @@ }, { "url": "http://www.dxstudio.com/forumtopic.aspx?topicid=b4152459-fb5f-4933-b700-b3fbd54f6bfd", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/504195/100/0/threaded", diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2074.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2074.json index f42352e066d..b4a5233cb33 100644 --- a/CVE-2009/CVE-2009-20xx/CVE-2009-2074.json +++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2074.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2074", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-16T19:30:00.187", - "lastModified": "2009-06-17T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -169,7 +169,15 @@ "url": "http://lampsecurity.org/drupal-nodeque-xss-vulnerability", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/35424", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2076.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2076.json index 28d1d123168..bf26a5b8382 100644 --- a/CVE-2009/CVE-2009-20xx/CVE-2009-2076.json +++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2076.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2076", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-16T19:30:00.250", - "lastModified": "2009-06-29T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -127,7 +127,15 @@ "url": "http://lampsecurity.org/drupal-views-xss-vulnerability", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/35425", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2079.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2079.json index 22a2441f37b..6d5b8b4587b 100644 --- a/CVE-2009/CVE-2009-20xx/CVE-2009-2079.json +++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2079.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2079", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-16T19:30:00.313", - "lastModified": "2009-06-17T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -129,7 +129,15 @@ "url": "http://lampsecurity.org/drupal-6-taxonomy-manager-xss-vulnerability", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/35391", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2083.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2083.json index 3fde58cfe97..41f72011583 100644 --- a/CVE-2009/CVE-2009-20xx/CVE-2009-2083.json +++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2083.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2083", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-16T21:00:00.437", - "lastModified": "2009-06-17T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -113,7 +113,15 @@ "url": "http://lampsecurity.org/drupal-6-taxonomy-manager-xss-vulnerability", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/35391", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" ] }, { diff --git a/CVE-2009/CVE-2009-24xx/CVE-2009-2435.json b/CVE-2009/CVE-2009-24xx/CVE-2009-2435.json index 009406fdcd4..9835fc963d2 100644 --- a/CVE-2009/CVE-2009-24xx/CVE-2009-2435.json +++ b/CVE-2009/CVE-2009-24xx/CVE-2009-2435.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2435", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-13T14:30:00.217", - "lastModified": "2009-07-13T14:30:00.217", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "http://www.senseofsecurity.com.au/advisories/SOS-09-004.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-27xx/CVE-2009-2704.json b/CVE-2009/CVE-2009-27xx/CVE-2009-2704.json index 71447b8c8f5..23ff38be934 100644 --- a/CVE-2009/CVE-2009-27xx/CVE-2009-2704.json +++ b/CVE-2009/CVE-2009-27xx/CVE-2009-2704.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2704", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-11T10:30:00.250", - "lastModified": "2021-04-12T14:17:15.607", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -74,7 +74,10 @@ "references": [ { "url": "http://i8jesus.com/?p=55", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-27xx/CVE-2009-2705.json b/CVE-2009/CVE-2009-27xx/CVE-2009-2705.json index 8373e939a34..249b6e0a52f 100644 --- a/CVE-2009/CVE-2009-27xx/CVE-2009-2705.json +++ b/CVE-2009/CVE-2009-27xx/CVE-2009-2705.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2705", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-11T10:30:00.593", - "lastModified": "2021-04-12T14:17:15.607", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,7 +85,10 @@ "references": [ { "url": "http://i8jesus.com/?p=55", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-27xx/CVE-2009-2783.json b/CVE-2009/CVE-2009-27xx/CVE-2009-2783.json index 9ad0b1fe417..13946a681f6 100644 --- a/CVE-2009/CVE-2009-27xx/CVE-2009-2783.json +++ b/CVE-2009/CVE-2009-27xx/CVE-2009-2783.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2783", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-17T16:30:01.360", - "lastModified": "2013-08-14T06:04:09.450", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,6 +78,17 @@ "Exploit" ] }, + { + "url": "http://osvdb.org/56638", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/36109", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/35895", "source": "cve@mitre.org", @@ -94,7 +105,10 @@ }, { "url": "http://www.senseofsecurity.com.au/advisories/SOS-09-005.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://xoops.svn.sourceforge.net/viewvc/xoops/XoopsCore/trunk/htdocs/modules/pm/viewpmsg.php?r1=2621&r2=3292", diff --git a/CVE-2009/CVE-2009-28xx/CVE-2009-2892.json b/CVE-2009/CVE-2009-28xx/CVE-2009-2892.json index 01a1ff70c3c..65dc41abdb2 100644 --- a/CVE-2009/CVE-2009-28xx/CVE-2009-2892.json +++ b/CVE-2009/CVE-2009-28xx/CVE-2009-2892.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2892", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-20T17:30:09.500", - "lastModified": "2017-09-19T01:29:20.640", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/35976", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/9252", "source": "cve@mitre.org" @@ -79,14 +86,16 @@ "url": "http://www.scripteen.com/forum/bug-reports-f15-my-image-hosting-site-got-hacked-t764.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { "url": "http://www.scripteen.com/forum/news-announcements-f2-scripteen-free-image-hosting-script-v2-4-t766.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-29xx/CVE-2009-2922.json b/CVE-2009/CVE-2009-29xx/CVE-2009-2922.json index 314464cfe12..85a67eeff6a 100644 --- a/CVE-2009/CVE-2009-29xx/CVE-2009-2922.json +++ b/CVE-2009/CVE-2009-29xx/CVE-2009-2922.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2922", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-21T11:30:00.390", - "lastModified": "2017-09-19T01:29:21.593", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -84,7 +84,8 @@ "url": "http://www.pixaria.com/news/article/234", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-29xx/CVE-2009-2933.json b/CVE-2009/CVE-2009-29xx/CVE-2009-2933.json index fbcedc98a70..6acdb3fdf8d 100644 --- a/CVE-2009/CVE-2009-29xx/CVE-2009-2933.json +++ b/CVE-2009/CVE-2009-29xx/CVE-2009-2933.json @@ -2,7 +2,7 @@ "id": "CVE-2009-2933", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-21T20:30:00.437", - "lastModified": "2018-10-10T19:42:46.220", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,13 +72,23 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/36333", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/archive/1/505801/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.senseofsecurity.com.au/advisories/SOS-09-007.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-31xx/CVE-2009-3156.json b/CVE-2009/CVE-2009-31xx/CVE-2009-3156.json index 5c6ed8fc3fe..2058d46da22 100644 --- a/CVE-2009/CVE-2009-31xx/CVE-2009-3156.json +++ b/CVE-2009/CVE-2009-31xx/CVE-2009-3156.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3156", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-10T18:30:00.483", - "lastModified": "2017-08-17T01:31:02.460", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,20 @@ }, { "url": "http://lampsecurity.org/drupal-date-xss-vulnerability", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/36006", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/56608", "source": "cve@mitre.org" }, { diff --git a/CVE-2009/CVE-2009-31xx/CVE-2009-3157.json b/CVE-2009/CVE-2009-31xx/CVE-2009-3157.json index 017a956fade..93862a1d0c7 100644 --- a/CVE-2009/CVE-2009-31xx/CVE-2009-3157.json +++ b/CVE-2009/CVE-2009-31xx/CVE-2009-3157.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3157", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-10T18:30:00.517", - "lastModified": "2009-09-11T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -161,6 +161,20 @@ }, { "url": "http://lampsecurity.org/drupal-date-xss-vulnerability", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/36012", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/56611", "source": "cve@mitre.org" }, { diff --git a/CVE-2009/CVE-2009-32xx/CVE-2009-3222.json b/CVE-2009/CVE-2009-32xx/CVE-2009-3222.json index 6eb1d73e971..796d470a83f 100644 --- a/CVE-2009/CVE-2009-32xx/CVE-2009-3222.json +++ b/CVE-2009/CVE-2009-32xx/CVE-2009-3222.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3222", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-16T19:30:00.593", - "lastModified": "2017-08-17T01:31:03.740", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,13 +78,27 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/35887", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/56036", + "source": "cve@mitre.org" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51821", "source": "cve@mitre.org" }, { "url": "https://security-shell.ws/showthread.php?t=38085", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-34xx/CVE-2009-3418.json b/CVE-2009/CVE-2009-34xx/CVE-2009-3418.json index 70ed1110d4c..fc3855170ea 100644 --- a/CVE-2009/CVE-2009-34xx/CVE-2009-3418.json +++ b/CVE-2009/CVE-2009-34xx/CVE-2009-3418.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3418", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-25T22:30:09.313", - "lastModified": "2011-11-10T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -71,9 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/36277", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.senseofsecurity.com.au/advisories/SOS-09-006.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-34xx/CVE-2009-3448.json b/CVE-2009/CVE-2009-34xx/CVE-2009-3448.json index d8e12d84c6b..676b2afe162 100644 --- a/CVE-2009/CVE-2009-34xx/CVE-2009-3448.json +++ b/CVE-2009/CVE-2009-34xx/CVE-2009-3448.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3448", "sourceIdentifier": "cve@mitre.org", "published": "2009-09-29T15:30:00.483", - "lastModified": "2017-08-17T01:31:07.037", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,23 @@ } ], "references": [ + { + "url": "http://osvdb.org/58329", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/36847", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.insight-tech.org/index.php?p=bakbone-netvault-backup-8-22-build-29-remote-dos", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-35xx/CVE-2009-3573.json b/CVE-2009/CVE-2009-35xx/CVE-2009-3573.json index 06b9d61481e..1fad99f3434 100644 --- a/CVE-2009/CVE-2009-35xx/CVE-2009-3573.json +++ b/CVE-2009/CVE-2009-35xx/CVE-2009-3573.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3573", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-06T20:30:00.377", - "lastModified": "2017-08-17T01:31:10.240", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/36896", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/36566", "source": "cve@mitre.org", @@ -82,7 +89,8 @@ "url": "http://www.shinnai.net/xplits/TXT_17zVMhRhsRE6qC6DAj52.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-36xx/CVE-2009-3649.json b/CVE-2009/CVE-2009-36xx/CVE-2009-3649.json index 2674ccd4417..f30f37d3049 100644 --- a/CVE-2009/CVE-2009-36xx/CVE-2009-3649.json +++ b/CVE-2009/CVE-2009-36xx/CVE-2009-3649.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3649", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-09T14:30:00.437", - "lastModified": "2018-10-10T19:47:21.467", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,7 +73,10 @@ "references": [ { "url": "http://www.sec-area.com/?p=141%23more-141>lang=en", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/archive/1/506992/100/0/threaded", diff --git a/CVE-2009/CVE-2009-37xx/CVE-2009-3707.json b/CVE-2009/CVE-2009-37xx/CVE-2009-3707.json index ddb1a162667..9eb4bbcc0f3 100644 --- a/CVE-2009/CVE-2009-37xx/CVE-2009-3707.json +++ b/CVE-2009/CVE-2009-37xx/CVE-2009-3707.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3707", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-16T16:30:00.907", - "lastModified": "2013-05-15T03:01:10.180", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -198,6 +198,21 @@ "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/36988", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/39206", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/39215", + "source": "cve@mitre.org" + }, { "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "source": "cve@mitre.org" @@ -212,17 +227,24 @@ }, { "url": "http://www.shinnai.net/exploits/abFwcLOuFqmD20yqhYpQ.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.shinnai.net/index.php?mod=02_Forum&group=02_Bugs_and_Exploits&argument=01_Remote&topic=1254924405.ff.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.shinnai.net/xplits/TXT_JtYUv6C6j5b6Bw6iIkF4.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-37xx/CVE-2009-3711.json b/CVE-2009/CVE-2009-37xx/CVE-2009-3711.json index b8fbec4b77d..736cfbcd6bd 100644 --- a/CVE-2009/CVE-2009-37xx/CVE-2009-3711.json +++ b/CVE-2009/CVE-2009-37xx/CVE-2009-3711.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3711", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-16T16:30:01.000", - "lastModified": "2018-10-10T19:47:29.280", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,11 +83,23 @@ "Exploit" ] }, + { + "url": "http://osvdb.org/58714", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/36991", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.pank4j.com/exploits/httpdxb0f.php", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-38xx/CVE-2009-3861.json b/CVE-2009/CVE-2009-38xx/CVE-2009-3861.json index 04f97352f1a..c92ff26c9f9 100644 --- a/CVE-2009/CVE-2009-38xx/CVE-2009-3861.json +++ b/CVE-2009/CVE-2009-38xx/CVE-2009-3861.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3861", "sourceIdentifier": "cve@mitre.org", "published": "2009-11-04T17:30:00.343", - "lastModified": "2018-10-10T19:47:50.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -159,7 +159,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-09-008", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-39xx/CVE-2009-3902.json b/CVE-2009/CVE-2009-39xx/CVE-2009-3902.json index fb74e8ccd9f..da9946d664b 100644 --- a/CVE-2009/CVE-2009-39xx/CVE-2009-3902.json +++ b/CVE-2009/CVE-2009-39xx/CVE-2009-3902.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3902", "sourceIdentifier": "cve@mitre.org", "published": "2009-11-06T15:30:00.687", - "lastModified": "2017-08-17T01:31:19.443", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,14 @@ { "url": "http://freetexthost.com/ncyss3plli", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/59588", + "source": "cve@mitre.org", "tags": [ "Exploit" ] @@ -97,6 +105,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/37183", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/36874", "source": "cve@mitre.org", diff --git a/CVE-2009/CVE-2009-40xx/CVE-2009-4094.json b/CVE-2009/CVE-2009-40xx/CVE-2009-4094.json index dd1acaa6741..deb01bd7fe7 100644 --- a/CVE-2009/CVE-2009-40xx/CVE-2009-4094.json +++ b/CVE-2009/CVE-2009-40xx/CVE-2009-4094.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4094", "sourceIdentifier": "cve@mitre.org", "published": "2009-11-29T13:07:34.983", - "lastModified": "2017-08-17T01:31:26.070", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -87,7 +87,8 @@ "url": "http://www.kamtiez.org/2009/11/joomla-mambo-component-comezine-remote.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-42xx/CVE-2009-4219.json b/CVE-2009/CVE-2009-42xx/CVE-2009-4219.json index 37ff402941c..956e27c5bc6 100644 --- a/CVE-2009/CVE-2009-42xx/CVE-2009-4219.json +++ b/CVE-2009/CVE-2009-42xx/CVE-2009-4219.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4219", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-07T17:30:00.407", - "lastModified": "2016-11-28T19:07:13.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/37509", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/82346", "source": "cve@mitre.org" @@ -79,7 +86,8 @@ "url": "http://www.shinnai.net/exploits/ZzLsi6TIfSuVPh1kPHmP.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2009/CVE-2009-42xx/CVE-2009-4237.json b/CVE-2009/CVE-2009-42xx/CVE-2009-4237.json index b735505aa00..192b20ad738 100644 --- a/CVE-2009/CVE-2009-42xx/CVE-2009-4237.json +++ b/CVE-2009/CVE-2009-42xx/CVE-2009-4237.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4237", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-10T23:30:00.313", - "lastModified": "2014-05-05T04:36:49.917", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -116,6 +116,26 @@ "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0221.html", "source": "cve@mitre.org" }, + { + "url": "http://osvdb.org/60914", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/60915", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/60916", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/60917", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/60918", + "source": "cve@mitre.org" + }, { "url": "http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities", "source": "cve@mitre.org", @@ -136,7 +156,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2009/CVE-2009-42xx/CVE-2009-4238.json b/CVE-2009/CVE-2009-42xx/CVE-2009-4238.json index 1433091e7ed..ce53100d0ba 100644 --- a/CVE-2009/CVE-2009-42xx/CVE-2009-4238.json +++ b/CVE-2009/CVE-2009-42xx/CVE-2009-4238.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4238", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-10T23:30:00.377", - "lastModified": "2014-05-05T04:36:50.043", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -145,6 +145,14 @@ "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0221.html", "source": "cve@mitre.org" }, + { + "url": "http://osvdb.org/60919", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/60920", + "source": "cve@mitre.org" + }, { "url": "http://www.coresecurity.com/content/testlink-multiple-injection-vulnerabilities", "source": "cve@mitre.org", @@ -164,7 +172,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2009/CVE-2009-42xx/CVE-2009-4265.json b/CVE-2009/CVE-2009-42xx/CVE-2009-4265.json index 30088ce9c18..488223c089a 100644 --- a/CVE-2009/CVE-2009-42xx/CVE-2009-4265.json +++ b/CVE-2009/CVE-2009-42xx/CVE-2009-4265.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4265", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-10T16:30:00.530", - "lastModified": "2009-12-11T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://freetexthost.com/abydoz3jwu", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { @@ -84,6 +85,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/37572", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-45xx/CVE-2009-4529.json b/CVE-2009/CVE-2009-45xx/CVE-2009-4529.json index 712aed8342c..b0ca1402f75 100644 --- a/CVE-2009/CVE-2009-45xx/CVE-2009-4529.json +++ b/CVE-2009/CVE-2009-45xx/CVE-2009-4529.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4529", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-31T19:30:00.627", - "lastModified": "2017-08-17T01:31:37.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -84,12 +84,26 @@ "references": [ { "url": "http://freetexthost.com/n5l0h34pxc", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/58949", "source": "cve@mitre.org" }, { "url": "http://pocoftheday.blogspot.com/2009/10/navicopa-web-server-3012-remote-source.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/37014", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.packetstormsecurity.org/0910-exploits/navicopa-disclose.txt", "source": "cve@mitre.org", diff --git a/CVE-2009/CVE-2009-45xx/CVE-2009-4531.json b/CVE-2009/CVE-2009-45xx/CVE-2009-4531.json index b5cb9498f3c..bda6058f8c3 100644 --- a/CVE-2009/CVE-2009-45xx/CVE-2009-4531.json +++ b/CVE-2009/CVE-2009-45xx/CVE-2009-4531.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4531", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-31T19:30:00.670", - "lastModified": "2017-08-17T01:31:37.180", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,7 +86,8 @@ "url": "http://freetexthost.com/eiyfyt0km5", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { @@ -103,6 +104,17 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/37013", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/58857", + "source": "cve@mitre.org" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53733", "source": "cve@mitre.org" diff --git a/CVE-2009/CVE-2009-45xx/CVE-2009-4535.json b/CVE-2009/CVE-2009-45xx/CVE-2009-4535.json index 2b34244f200..95851adf2ec 100644 --- a/CVE-2009/CVE-2009-45xx/CVE-2009-4535.json +++ b/CVE-2009/CVE-2009-45xx/CVE-2009-4535.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4535", "sourceIdentifier": "cve@mitre.org", "published": "2009-12-31T19:30:00.780", - "lastModified": "2010-01-04T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -76,7 +76,8 @@ "url": "http://freetexthost.com/0lcsrgt3vw", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { @@ -85,6 +86,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/36934", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-45xx/CVE-2009-4577.json b/CVE-2009/CVE-2009-45xx/CVE-2009-4577.json index 1e5966c3b0f..b3c0fcd9ee7 100644 --- a/CVE-2009/CVE-2009-45xx/CVE-2009-4577.json +++ b/CVE-2009/CVE-2009-45xx/CVE-2009-4577.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4577", "sourceIdentifier": "cve@mitre.org", "published": "2010-01-06T22:00:09.057", - "lastModified": "2017-08-17T01:31:39.490", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,14 +83,26 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/37748", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.maxdev.com/Article661.phtml", "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, + { + "url": "http://www.osvdb.org/61347", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/37488", "source": "cve@mitre.org" diff --git a/CVE-2009/CVE-2009-45xx/CVE-2009-4588.json b/CVE-2009/CVE-2009-45xx/CVE-2009-4588.json index d14119f227c..ecc5b8db38e 100644 --- a/CVE-2009/CVE-2009-45xx/CVE-2009-4588.json +++ b/CVE-2009/CVE-2009-45xx/CVE-2009-4588.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4588", "sourceIdentifier": "cve@mitre.org", "published": "2010-01-07T18:30:00.887", - "lastModified": "2017-09-19T01:29:59.813", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/35764", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/9116", "source": "cve@mitre.org" @@ -94,7 +101,8 @@ "url": "http://www.shinnai.net/exploits/nsGUdeley3EHfKEV690p.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-47xx/CVE-2009-4781.json b/CVE-2009/CVE-2009-47xx/CVE-2009-4781.json index 8c7f76063a7..a33060643eb 100644 --- a/CVE-2009/CVE-2009-47xx/CVE-2009-4781.json +++ b/CVE-2009/CVE-2009-47xx/CVE-2009-4781.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4781", "sourceIdentifier": "cve@mitre.org", "published": "2010-04-21T14:30:00.757", - "lastModified": "2010-04-22T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -82,6 +82,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/37553", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/10201", "source": "cve@mitre.org", @@ -91,7 +98,10 @@ }, { "url": "http://www.tekuva.com/index.php?option=com_docman&task=doc_details&gid=40&Itemid=9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-48xx/CVE-2009-4811.json b/CVE-2009/CVE-2009-48xx/CVE-2009-4811.json index b04a7e18565..e9118dcac6b 100644 --- a/CVE-2009/CVE-2009-48xx/CVE-2009-4811.json +++ b/CVE-2009/CVE-2009-48xx/CVE-2009-4811.json @@ -2,7 +2,7 @@ "id": "CVE-2009-4811", "sourceIdentifier": "cve@mitre.org", "published": "2010-04-27T15:30:00.420", - "lastModified": "2013-05-15T03:04:19.047", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -198,7 +198,8 @@ "url": "http://freetexthost.com/qr1tffkzpu", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-50xx/CVE-2009-5066.json b/CVE-2009/CVE-2009-50xx/CVE-2009-5066.json index 72f1082307e..294f57c1b58 100644 --- a/CVE-2009/CVE-2009-50xx/CVE-2009-5066.json +++ b/CVE-2009/CVE-2009-50xx/CVE-2009-5066.json @@ -2,7 +2,7 @@ "id": "CVE-2009-5066", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:01.163", - "lastModified": "2015-01-18T02:59:03.663", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,7 +78,10 @@ "references": [ { "url": "http://objectopia.com/2009/10/01/securing-jmx-invoker-layer-in-jboss/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-0191.html", @@ -120,6 +123,14 @@ "url": "http://rhn.redhat.com/errata/RHSA-2013-0533.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/51984", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/52054", + "source": "secalert@redhat.com" + }, { "url": "http://www.openwall.com/lists/oss-security/2012/07/20/1", "source": "secalert@redhat.com" diff --git a/CVE-2009/CVE-2009-50xx/CVE-2009-5076.json b/CVE-2009/CVE-2009-50xx/CVE-2009-5076.json index b3618cad172..8ac33090e3f 100644 --- a/CVE-2009/CVE-2009-50xx/CVE-2009-5076.json +++ b/CVE-2009/CVE-2009-50xx/CVE-2009-5076.json @@ -2,7 +2,7 @@ "id": "CVE-2009-5076", "sourceIdentifier": "cve@mitre.org", "published": "2011-06-08T10:36:12.543", - "lastModified": "2012-04-27T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,7 +86,8 @@ "url": "http://hosting-4-creloaded.com/node/116", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2009/CVE-2009-50xx/CVE-2009-5077.json b/CVE-2009/CVE-2009-50xx/CVE-2009-5077.json index c1619aa9402..b8b67679a0c 100644 --- a/CVE-2009/CVE-2009-50xx/CVE-2009-5077.json +++ b/CVE-2009/CVE-2009-50xx/CVE-2009-5077.json @@ -2,7 +2,7 @@ "id": "CVE-2009-5077", "sourceIdentifier": "cve@mitre.org", "published": "2011-06-08T15:55:01.233", - "lastModified": "2012-04-25T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -81,7 +81,8 @@ "url": "http://hosting-4-creloaded.com/node/116", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2010/CVE-2010-03xx/CVE-2010-0356.json b/CVE-2010/CVE-2010-03xx/CVE-2010-0356.json index 64f38d2de1b..aa0ed0cadd6 100644 --- a/CVE-2010/CVE-2010-03xx/CVE-2010-0356.json +++ b/CVE-2010/CVE-2010-03xx/CVE-2010-0356.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0356", "sourceIdentifier": "cve@mitre.org", "published": "2010-01-18T19:30:00.650", - "lastModified": "2017-08-17T01:31:58.337", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/38156", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.shinnai.net/exploits/X6hU4E0E7P5H3qH5yXrn.txt", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2010/CVE-2010-03xx/CVE-2010-0392.json b/CVE-2010/CVE-2010-03xx/CVE-2010-0392.json index ee00d64b052..e76a9106f95 100644 --- a/CVE-2010/CVE-2010-03xx/CVE-2010-0392.json +++ b/CVE-2010/CVE-2010-03xx/CVE-2010-0392.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0392", "sourceIdentifier": "cve@mitre.org", "published": "2010-01-26T18:30:01.197", - "lastModified": "2018-10-10T19:52:21.817", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -76,6 +76,17 @@ } ], "references": [ + { + "url": "http://osvdb.org/61866", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/38262", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/archive/1/509091/100/0/threaded", "source": "cve@mitre.org" @@ -88,7 +99,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-10-001", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2010/CVE-2010-04xx/CVE-2010-0425.json b/CVE-2010/CVE-2010-04xx/CVE-2010-0425.json index a19b8039055..8ac01146b77 100644 --- a/CVE-2010/CVE-2010-04xx/CVE-2010-0425.json +++ b/CVE-2010/CVE-2010-04xx/CVE-2010-0425.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0425", "sourceIdentifier": "secalert@redhat.com", "published": "2010-03-05T19:30:00.517", - "lastModified": "2023-11-07T02:05:05.130", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -472,7 +472,10 @@ }, { "url": "http://www.senseofsecurity.com.au/advisories/SOS-10-002", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2010-0014.html", diff --git a/CVE-2010/CVE-2010-07xx/CVE-2010-0761.json b/CVE-2010/CVE-2010-07xx/CVE-2010-0761.json index 6f58511056f..8037a825fd5 100644 --- a/CVE-2010/CVE-2010-07xx/CVE-2010-0761.json +++ b/CVE-2010/CVE-2010-07xx/CVE-2010-0761.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0761", "sourceIdentifier": "cve@mitre.org", "published": "2010-03-02T18:30:00.853", - "lastModified": "2017-08-17T01:32:06.477", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://osvdb.org/62277", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + }, { "url": "http://packetstormsecurity.org/1002-exploits/ebooksrental-sql.txt", "source": "cve@mitre.org", @@ -78,6 +85,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/38520", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/11402", "source": "cve@mitre.org", @@ -89,7 +103,8 @@ "url": "http://www.indonesiancoder.org/booksebooks-rental-software-sql-injection-vulnerability", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2010/CVE-2010-07xx/CVE-2010-0762.json b/CVE-2010/CVE-2010-07xx/CVE-2010-0762.json index abcab63071d..b6779d87ee6 100644 --- a/CVE-2010/CVE-2010-07xx/CVE-2010-0762.json +++ b/CVE-2010/CVE-2010-07xx/CVE-2010-0762.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0762", "sourceIdentifier": "cve@mitre.org", "published": "2010-03-02T18:30:00.900", - "lastModified": "2017-08-17T01:32:06.540", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -78,6 +78,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/38519", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/11401", "source": "cve@mitre.org", @@ -88,6 +95,14 @@ { "url": "http://www.indonesiancoder.org/cd-rentals-script-sql-injection-vulnerability", "source": "cve@mitre.org", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://www.osvdb.org/62278", + "source": "cve@mitre.org", "tags": [ "Exploit" ] diff --git a/CVE-2010/CVE-2010-09xx/CVE-2010-0937.json b/CVE-2010/CVE-2010-09xx/CVE-2010-0937.json index 20784a7762a..10e0f57d6fd 100644 --- a/CVE-2010/CVE-2010-09xx/CVE-2010-0937.json +++ b/CVE-2010/CVE-2010-09xx/CVE-2010-0937.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0937", "sourceIdentifier": "cve@mitre.org", "published": "2010-03-08T15:30:00.560", - "lastModified": "2017-08-17T01:32:10.290", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -89,7 +89,10 @@ "references": [ { "url": "http://visualizationlibrary.com/documentation/pagchangelog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/37644", diff --git a/CVE-2010/CVE-2010-09xx/CVE-2010-0946.json b/CVE-2010/CVE-2010-09xx/CVE-2010-0946.json index 1fd5583c8ee..3329a4744e3 100644 --- a/CVE-2010/CVE-2010-09xx/CVE-2010-0946.json +++ b/CVE-2010/CVE-2010-09xx/CVE-2010-0946.json @@ -2,7 +2,7 @@ "id": "CVE-2010-0946", "sourceIdentifier": "cve@mitre.org", "published": "2010-03-08T15:30:00.873", - "lastModified": "2017-08-17T01:32:10.867", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -87,7 +87,8 @@ "url": "http://explo.it/exploits/11068", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json index e0643742a63..aa5f732fbf5 100644 --- a/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json +++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json @@ -2,7 +2,7 @@ "id": "CVE-2010-10010", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-01T05:15:09.503", - "lastModified": "2023-11-07T02:05:13.400", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -114,7 +114,8 @@ "url": "http://www.psychostats.com/forums/index.php?showtopic=20796&hl=", "source": "cna@vuldb.com", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2010/CVE-2010-10xx/CVE-2010-1033.json b/CVE-2010/CVE-2010-10xx/CVE-2010-1033.json index a428e08da1a..baa50c85bd1 100644 --- a/CVE-2010/CVE-2010-10xx/CVE-2010-1033.json +++ b/CVE-2010/CVE-2010-10xx/CVE-2010-1033.json @@ -2,7 +2,7 @@ "id": "CVE-2010-1033", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2010-04-21T14:30:01.147", - "lastModified": "2017-08-17T01:32:13.070", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -90,7 +90,17 @@ }, { "url": "http://net-ninja.net/blog/media/blogs/b/exploits/hpoperationsmngr.html.txt", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/39538", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://securitytracker.com/id?1023894", diff --git a/CVE-2010/CVE-2010-10xx/CVE-2010-1098.json b/CVE-2010/CVE-2010-10xx/CVE-2010-1098.json index a1722e827e9..8a1a342dca2 100644 --- a/CVE-2010/CVE-2010-10xx/CVE-2010-1098.json +++ b/CVE-2010/CVE-2010-10xx/CVE-2010-1098.json @@ -2,7 +2,7 @@ "id": "CVE-2010-1098", "sourceIdentifier": "cve@mitre.org", "published": "2010-03-24T22:44:14.670", - "lastModified": "2017-08-17T01:32:14.600", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -82,7 +82,10 @@ }, { "url": "http://skypher.com/index.php/2010/03/08/ani-file-bitmapinfoheader-biclrused-bounds-check-missing/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/38579", diff --git a/CVE-2010/CVE-2010-18xx/CVE-2010-1873.json b/CVE-2010/CVE-2010-18xx/CVE-2010-1873.json index 3a5aa3deaf6..e925c01011e 100644 --- a/CVE-2010/CVE-2010-18xx/CVE-2010-1873.json +++ b/CVE-2010/CVE-2010-18xx/CVE-2010-1873.json @@ -2,7 +2,7 @@ "id": "CVE-2010-1873", "sourceIdentifier": "cve@mitre.org", "published": "2010-05-12T11:46:12.487", - "lastModified": "2017-08-17T01:32:31.540", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://indonesiancoder.org/joomla-component-jvehicles-aid-sql-injection-vulnerability", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { @@ -107,6 +108,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/39401", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/12190", "source": "cve@mitre.org", @@ -114,6 +122,10 @@ "Exploit" ] }, + { + "url": "http://www.osvdb.org/63669", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/39409", "source": "cve@mitre.org", diff --git a/CVE-2010/CVE-2010-20xx/CVE-2010-2076.json b/CVE-2010/CVE-2010-20xx/CVE-2010-2076.json index c7618770941..0021d6a3c85 100644 --- a/CVE-2010/CVE-2010-20xx/CVE-2010-2076.json +++ b/CVE-2010/CVE-2010-20xx/CVE-2010-2076.json @@ -2,8 +2,8 @@ "id": "CVE-2010-2076", "sourceIdentifier": "secalert@redhat.com", "published": "2010-08-19T18:00:02.937", - "lastModified": "2023-02-13T04:20:24.667", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T01:17:43.863", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -254,6 +254,27 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/40969", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/41016", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/41025", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf", "source": "secalert@redhat.com", @@ -263,7 +284,10 @@ }, { "url": "http://www.listware.net/201006/cxf-users/60160-important-apache-cxf-security-advisory-cve-2010-2076.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/42492", diff --git a/CVE-2010/CVE-2010-29xx/CVE-2010-2909.json b/CVE-2010/CVE-2010-29xx/CVE-2010-2909.json index c2a78e2ed34..36ca8747eb1 100644 --- a/CVE-2010/CVE-2010-29xx/CVE-2010-2909.json +++ b/CVE-2010/CVE-2010-29xx/CVE-2010-2909.json @@ -2,7 +2,7 @@ "id": "CVE-2010-2909", "sourceIdentifier": "cve@mitre.org", "published": "2010-07-28T21:30:03.197", - "lastModified": "2018-10-10T20:00:20.157", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -90,6 +90,20 @@ "Exploit" ] }, + { + "url": "http://osvdb.org/66630", + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/40716", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/14481", "source": "cve@mitre.org", @@ -107,7 +121,10 @@ }, { "url": "http://www.toughtomato.com/downloads/16-comttvideo-1-0-1/file", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60662", diff --git a/CVE-2010/CVE-2010-41xx/CVE-2010-4151.json b/CVE-2010/CVE-2010-41xx/CVE-2010-4151.json index 51eaf9580ba..9cec1a748af 100644 --- a/CVE-2010/CVE-2010-41xx/CVE-2010-4151.json +++ b/CVE-2010/CVE-2010-41xx/CVE-2010-4151.json @@ -2,7 +2,7 @@ "id": "CVE-2010-4151", "sourceIdentifier": "cve@mitre.org", "published": "2010-11-03T20:00:02.687", - "lastModified": "2018-10-10T20:07:06.783", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -119,11 +119,19 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/41918", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.deluxebb.com/community/topic.php?tid=993", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2010/CVE-2010-45xx/CVE-2010-4516.json b/CVE-2010/CVE-2010-45xx/CVE-2010-4516.json index b84a795d781..e4a69efd42d 100644 --- a/CVE-2010/CVE-2010-45xx/CVE-2010-4516.json +++ b/CVE-2010/CVE-2010-45xx/CVE-2010-4516.json @@ -2,7 +2,7 @@ "id": "CVE-2010-4516", "sourceIdentifier": "cve@mitre.org", "published": "2010-12-09T21:00:02.227", - "lastModified": "2010-12-10T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,7 +96,17 @@ "references": [ { "url": "http://jxtended.com/blog/releases/375-jxtended-comments-131-stable-released.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://secunia.com/advisories/42534", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/45296", diff --git a/CVE-2010/CVE-2010-53xx/CVE-2010-5333.json b/CVE-2010/CVE-2010-53xx/CVE-2010-5333.json index 8bde46b105e..eeb3a41f2d6 100644 --- a/CVE-2010/CVE-2010-53xx/CVE-2010-5333.json +++ b/CVE-2010/CVE-2010-53xx/CVE-2010-5333.json @@ -2,7 +2,7 @@ "id": "CVE-2010-5333", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-13T16:15:12.047", - "lastModified": "2019-09-24T17:15:13.613", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -128,7 +128,10 @@ }, { "url": "https://purpl3f0xsec.tech/2019/08/04/osce-prep-integard.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://www.exploit-db.com/exploits/14941", diff --git a/CVE-2011/CVE-2011-00xx/CVE-2011-0049.json b/CVE-2011/CVE-2011-00xx/CVE-2011-0049.json index ea823a8e795..b5d22784c15 100644 --- a/CVE-2011/CVE-2011-00xx/CVE-2011-0049.json +++ b/CVE-2011/CVE-2011-00xx/CVE-2011-0049.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0049", "sourceIdentifier": "cve@mitre.org", "published": "2011-02-04T01:00:07.400", - "lastModified": "2018-10-10T20:09:23.653", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -217,6 +217,17 @@ } ], "references": [ + { + "url": "http://osvdb.org/70762", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/43125", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/8061", "source": "cve@mitre.org" @@ -274,7 +285,8 @@ "url": "https://sitewat.ch/en/Advisory/View/1", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-04xx/CVE-2011-0443.json b/CVE-2011/CVE-2011-04xx/CVE-2011-0443.json index 00f5fa06b68..4db7c0ffe5e 100644 --- a/CVE-2011/CVE-2011-04xx/CVE-2011-0443.json +++ b/CVE-2011/CVE-2011-04xx/CVE-2011-0443.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0443", "sourceIdentifier": "cve@mitre.org", "published": "2011-01-13T01:00:02.287", - "lastModified": "2017-08-17T01:33:30.587", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,9 +72,23 @@ ], "references": [ { - "url": "http://tinybb.net/forum/?page=thread&post=989525101", + "url": "http://osvdb.org/70394", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/42854", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tinybb.net/forum/?page=thread&post=989525101", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.exploit-db.com/exploits/15961", "source": "cve@mitre.org", diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json index dcbdd98ca81..7fcafdd69b3 100644 --- a/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json +++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0959.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0959", "sourceIdentifier": "ykramarz@cisco.com", "published": "2011-05-20T22:55:02.907", - "lastModified": "2017-08-17T01:33:45.463", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -142,7 +142,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json index ff4ec4847b7..d1f75228e49 100644 --- a/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json +++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0960.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0960", "sourceIdentifier": "ykramarz@cisco.com", "published": "2011-05-20T22:55:02.953", - "lastModified": "2017-08-17T01:33:45.510", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -146,7 +146,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json index 160f9baa485..2d1bf426f0d 100644 --- a/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json +++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0961.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0961", "sourceIdentifier": "ykramarz@cisco.com", "published": "2011-05-20T22:55:02.987", - "lastModified": "2017-08-17T01:33:45.573", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -154,7 +154,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json index d61021f6d7b..e68ed1f409f 100644 --- a/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json +++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0962.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0962", "sourceIdentifier": "ykramarz@cisco.com", "published": "2011-05-20T22:55:03.033", - "lastModified": "2017-08-17T01:33:45.633", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -139,7 +139,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json b/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json index b2ef37d2d23..efea604a37c 100644 --- a/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json +++ b/CVE-2011/CVE-2011-09xx/CVE-2011-0966.json @@ -2,7 +2,7 @@ "id": "CVE-2011-0966", "sourceIdentifier": "ykramarz@cisco.com", "published": "2011-05-20T22:55:03.063", - "lastModified": "2017-08-17T01:33:45.680", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -144,7 +144,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3850.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3850.json index 4a3e5c625c2..ac13eab3c83 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3850.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3850.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3850", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:03.343", - "lastModified": "2011-10-21T02:56:22.523", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -234,11 +234,16 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/46297", + "source": "cve@mitre.org" + }, { "url": "https://sitewat.ch/en/Advisories/8", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3851.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3851.json index 8103a7d0d48..ecdadbaa02f 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3851.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3851.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3851", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:03.483", - "lastModified": "2012-05-21T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -88,7 +88,8 @@ "url": "https://sitewat.ch/en/Advisories/9", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3852.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3852.json index 6348dc56212..f1d47e5afeb 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3852.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3852.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3852", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:03.560", - "lastModified": "2012-05-21T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -218,7 +218,8 @@ "url": "https://sitewat.ch/en/Advisories/10", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3853.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3853.json index 7ede1e85c63..0c1891410e0 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3853.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3853.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3853", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:03.903", - "lastModified": "2012-05-21T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -148,7 +148,8 @@ "url": "https://sitewat.ch/en/Advisories/11", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3854.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3854.json index afbdf31ce5d..c621eae684c 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3854.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3854.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3854", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:03.950", - "lastModified": "2011-10-21T02:56:22.977", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -204,11 +204,16 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/46296", + "source": "cve@mitre.org" + }, { "url": "https://sitewat.ch/en/Advisories/12", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3855.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3855.json index 1f575d7aa7a..2746d3346da 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3855.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3855.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3855", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:03.997", - "lastModified": "2012-05-21T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -118,7 +118,8 @@ "url": "https://sitewat.ch/en/Advisories/13", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3856.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3856.json index 0bdfc821289..84264c150bf 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3856.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3856.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3856", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.060", - "lastModified": "2012-05-21T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -153,7 +153,8 @@ "url": "https://sitewat.ch/en/Advisories/14", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3857.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3857.json index 97e71f5bfe4..2b680847c1b 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3857.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3857.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3857", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.107", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -133,7 +133,8 @@ "url": "https://sitewat.ch/en/Advisories/15", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3858.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3858.json index 21934bdbd55..f7bb5c987e3 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3858.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3858.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3858", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.170", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -238,7 +238,8 @@ "url": "https://sitewat.ch/en/Advisories/16", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3859.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3859.json index cefec01122a..d2a7c5e7cf0 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3859.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3859.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3859", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.247", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -88,7 +88,8 @@ "url": "https://sitewat.ch/en/Advisories/17", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3860.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3860.json index 76bcc026945..d11a43d1ed0 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3860.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3860.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3860", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.310", - "lastModified": "2011-10-30T03:39:10.233", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -192,7 +192,8 @@ "url": "https://sitewat.ch/en/Advisories/18", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3861.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3861.json index 63c8a10a10e..b8915bb881f 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3861.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3861.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3861", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.373", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -93,7 +93,8 @@ "url": "https://sitewat.ch/en/Advisories/19", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3862.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3862.json index 572f72ef2b3..f2d62b60591 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3862.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3862.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3862", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.450", - "lastModified": "2011-10-22T02:59:12.777", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -120,8 +120,15 @@ ], "references": [ { - "url": "https://sitewat.ch/en/Advisories/20", + "url": "http://secunia.com/advisories/46295", "source": "cve@mitre.org" + }, + { + "url": "https://sitewat.ch/en/Advisories/20", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3863.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3863.json index 1c2f196db01..52bdbcb6330 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3863.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3863.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3863", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.513", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -208,7 +208,8 @@ "url": "https://sitewat.ch/en/Advisories/22", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3864.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3864.json index 1012c136698..359e39d3c2c 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3864.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3864.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3864", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.547", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -173,7 +173,8 @@ "url": "https://sitewat.ch/en/Advisories/23", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-38xx/CVE-2011-3865.json b/CVE-2011/CVE-2011-38xx/CVE-2011-3865.json index c1595ac4b30..d0134af69ec 100644 --- a/CVE-2011/CVE-2011-38xx/CVE-2011-3865.json +++ b/CVE-2011/CVE-2011-38xx/CVE-2011-3865.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3865", "sourceIdentifier": "cve@mitre.org", "published": "2011-09-28T10:55:04.623", - "lastModified": "2012-05-18T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -108,7 +108,8 @@ "url": "https://sitewat.ch/en/Advisories/24", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-39xx/CVE-2011-3976.json b/CVE-2011/CVE-2011-39xx/CVE-2011-3976.json index 7d6ca9c2d90..2b5e3be2e7c 100644 --- a/CVE-2011/CVE-2011-39xx/CVE-2011-3976.json +++ b/CVE-2011/CVE-2011-39xx/CVE-2011-3976.json @@ -2,7 +2,7 @@ "id": "CVE-2011-3976", "sourceIdentifier": "cve@mitre.org", "published": "2011-10-04T10:55:10.427", - "lastModified": "2017-08-29T01:30:25.537", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,11 +71,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/46099", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.digital-echidna.org/2011/09/scriptftp-3-3-remote-buffer-overflow-exploit-0day/", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-43xx/CVE-2011-4342.json b/CVE-2011/CVE-2011-43xx/CVE-2011-4342.json index 61685c72c4d..a3278760504 100644 --- a/CVE-2011/CVE-2011-43xx/CVE-2011-4342.json +++ b/CVE-2011/CVE-2011-43xx/CVE-2011-4342.json @@ -2,7 +2,7 @@ "id": "CVE-2011-4342", "sourceIdentifier": "secalert@redhat.com", "published": "2012-10-08T18:55:00.887", - "lastModified": "2012-10-09T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,6 +98,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/43565", + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://wordpress.org/support/topic/plugin-backwpup-remote-and-local-codeexecution-vulnerability-sos-11-003", "source": "secalert@redhat.com" @@ -124,11 +131,19 @@ ] }, { - "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-003.pdf", + "url": "http://www.osvdb.org/71481", "source": "secalert@redhat.com", "tags": [ "Exploit" ] + }, + { + "url": "http://www.senseofsecurity.com.au/advisories/SOS-11-003.pdf", + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-45xx/CVE-2011-4562.json b/CVE-2011/CVE-2011-45xx/CVE-2011-4562.json index 6bc78dbd1ca..5fa3ca89aa2 100644 --- a/CVE-2011/CVE-2011-45xx/CVE-2011-4562.json +++ b/CVE-2011/CVE-2011-45xx/CVE-2011-4562.json @@ -2,7 +2,7 @@ "id": "CVE-2011-4562", "sourceIdentifier": "cve@mitre.org", "published": "2011-11-28T21:55:08.733", - "lastModified": "2017-08-29T01:30:31.007", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -85,6 +85,13 @@ "references": [ { "url": "http://dotxed.net/2011/websicherheit/lazy-xss-wenn-statistiken-und-loggs-zur-gefahr-werden.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/76092", "source": "cve@mitre.org" }, { @@ -98,6 +105,13 @@ "url": "http://plugins.trac.wordpress.org/changeset?reponame=&new=447262%40redirection&old=421721%40redirection", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/46310", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://wordpress.org/extend/plugins/redirection/changelog/", "source": "cve@mitre.org" diff --git a/CVE-2011/CVE-2011-45xx/CVE-2011-4563.json b/CVE-2011/CVE-2011-45xx/CVE-2011-4563.json index 7400ceba5ca..1bf8ac3318b 100644 --- a/CVE-2011/CVE-2011-45xx/CVE-2011-4563.json +++ b/CVE-2011/CVE-2011-45xx/CVE-2011-4563.json @@ -2,7 +2,7 @@ "id": "CVE-2011-4563", "sourceIdentifier": "cve@mitre.org", "published": "2011-11-28T21:55:08.920", - "lastModified": "2011-11-29T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,12 +72,20 @@ ], "references": [ { - "url": "http://www.jakcms.com/tracker/t/62/cross-site-scripting-flaw", + "url": "http://secunia.com/advisories/46378", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, + { + "url": "http://www.jakcms.com/tracker/t/62/cross-site-scripting-flaw", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, { "url": "http://www.securityfocus.com/bid/50034", "source": "cve@mitre.org" diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5021.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5021.json index 10b4a87d9fc..f176ee68482 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5021.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5021.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5021", "sourceIdentifier": "cve@mitre.org", "published": "2011-12-29T04:15:05.140", - "lastModified": "2011-12-29T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,7 +79,10 @@ "references": [ { "url": "https://sitewat.ch/Advisory/View/7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5022.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5022.json index 5ccdf065aa7..607fb4a3af0 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5022.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5022.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5022", "sourceIdentifier": "cve@mitre.org", "published": "2011-12-29T11:55:08.017", - "lastModified": "2011-12-29T14:10:57.610", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,7 +79,8 @@ "url": "https://sitewat.ch/Advisory/View/5", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5023.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5023.json index c0b31826a76..1a9788917ff 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5023.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5023.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5023", "sourceIdentifier": "cve@mitre.org", "published": "2011-12-29T11:55:08.577", - "lastModified": "2012-02-01T04:12:34.977", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -83,7 +83,8 @@ "url": "https://sitewat.ch/Advisory/View/6", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5024.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5024.json index dcade1b9e4a..fb95559329d 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5024.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5024.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5024", "sourceIdentifier": "cve@mitre.org", "published": "2011-12-29T11:55:10.093", - "lastModified": "2013-01-03T05:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -133,7 +133,10 @@ "references": [ { "url": "https://sitewat.ch/Advisory/View/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5025.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5025.json index 3630efc81a6..e2fa994fb7d 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5025.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5025.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5025", "sourceIdentifier": "cve@mitre.org", "published": "2011-12-29T11:55:10.250", - "lastModified": "2012-09-25T03:42:53.333", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "https://sitewat.ch/Advisory/View/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5090.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5090.json index 211a08c6bab..43642e5872d 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5090.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5090.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5090", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-24T00:55:01.193", - "lastModified": "2017-08-29T01:30:40.817", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://sirini.net/grboard/board.php?id=developer&articleNo=591", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-50xx/CVE-2011-5091.json b/CVE-2011/CVE-2011-50xx/CVE-2011-5091.json index 437d1f2c9ee..073ff272707 100644 --- a/CVE-2011/CVE-2011-50xx/CVE-2011-5091.json +++ b/CVE-2011/CVE-2011-50xx/CVE-2011-5091.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5091", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-24T00:55:01.240", - "lastModified": "2017-08-29T01:30:40.867", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://sirini.net/grboard/board.php?id=developer&articleNo=591", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2011/CVE-2011-51xx/CVE-2011-5168.json b/CVE-2011/CVE-2011-51xx/CVE-2011-5168.json index fca48eb932c..1b3b452f03f 100644 --- a/CVE-2011/CVE-2011-51xx/CVE-2011-5168.json +++ b/CVE-2011/CVE-2011-51xx/CVE-2011-5168.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5168", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-15T17:55:05.083", - "lastModified": "2013-09-11T06:22:53.637", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,7 +81,10 @@ }, { "url": "http://www.doyoubananadance.com/Program-News/Important-Notice-About-SQLi-Exploit", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.exploit-db.com/exploits/17919", @@ -90,6 +93,10 @@ "Exploit" ] }, + { + "url": "http://www.osvdb.org/83882", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/49903", "source": "cve@mitre.org" diff --git a/CVE-2011/CVE-2011-51xx/CVE-2011-5175.json b/CVE-2011/CVE-2011-51xx/CVE-2011-5175.json index 7f1831560a7..1695a6dfd3d 100644 --- a/CVE-2011/CVE-2011-51xx/CVE-2011-5175.json +++ b/CVE-2011/CVE-2011-51xx/CVE-2011-5175.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5175", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-15T17:55:05.753", - "lastModified": "2012-09-17T17:22:44.517", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -93,7 +93,10 @@ }, { "url": "http://www.doyoubananadance.com/Program-News/Important-Notice-About-SQLi-Exploit", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-51xx/CVE-2011-5176.json b/CVE-2011/CVE-2011-51xx/CVE-2011-5176.json index 20d9a1de6d3..51b2cb57dd2 100644 --- a/CVE-2011/CVE-2011-51xx/CVE-2011-5176.json +++ b/CVE-2011/CVE-2011-51xx/CVE-2011-5176.json @@ -2,7 +2,7 @@ "id": "CVE-2011-5176", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-15T17:55:05.800", - "lastModified": "2012-09-17T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -83,7 +83,10 @@ }, { "url": "http://www.doyoubananadance.com/Program-News/Important-Notice-About-SQLi-Exploit", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-06xx/CVE-2012-0693.json b/CVE-2012/CVE-2012-06xx/CVE-2012-0693.json index 6def82fa2ce..f4afbc4a405 100644 --- a/CVE-2012/CVE-2012-06xx/CVE-2012-0693.json +++ b/CVE-2012/CVE-2012-06xx/CVE-2012-0693.json @@ -2,7 +2,7 @@ "id": "CVE-2012-0693", "sourceIdentifier": "cve@mitre.org", "published": "2012-01-14T03:57:27.213", - "lastModified": "2023-11-07T02:10:01.110", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -73,11 +73,17 @@ "references": [ { "url": "http://www.oscommerceuniversity.com/lounge/index.php/board%2C23.0.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.oscommerceuniversity.com/lounge/index.php/topic%2C1209.0.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json index def6ec540c9..58e25c4b467 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4034", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:01.027", - "lastModified": "2017-08-29T01:32:08.383", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,14 +72,29 @@ ], "references": [ { - "url": "http://www.pbboard.com/forums/t10352.html", + "url": "http://osvdb.org/84480", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/50153", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10352.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.pbboard.com/forums/t10353.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json index ed337d053fe..064e3b71fb7 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4035", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:01.073", - "lastModified": "2017-08-29T01:32:08.430", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,14 +72,29 @@ ], "references": [ { - "url": "http://www.pbboard.com/forums/t10352.html", + "url": "http://osvdb.org/84481", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/50153", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10352.html", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, { "url": "http://www.pbboard.com/forums/t10353.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json index f13406a9450..7f5c9141f2f 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4036", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T23:55:02.460", - "lastModified": "2017-08-29T01:32:08.493", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'", "descriptions": [ @@ -73,17 +73,30 @@ ], "references": [ { - "url": "http://www.pbboard.com/forums/t10352.html", + "url": "http://osvdb.org/84479", + "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/50153", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, + { + "url": "http://www.pbboard.com/forums/t10352.html", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, { "url": "http://www.pbboard.com/forums/t10353.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json index 55c3aff6f02..fb2f07ead7a 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4267", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.240", - "lastModified": "2012-08-14T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -202,11 +202,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/49148", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://smwyg.com/blog/#sockso-persistant-xss-attack", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json index 7da7e443c4d..f666b5aa4e8 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4871", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:01.487", - "lastModified": "2017-08-29T01:32:24.430", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,7 +75,8 @@ "url": "http://k1p0d.com/?p=25", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { @@ -85,6 +86,13 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/48400", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74144", "source": "cve@mitre.org" diff --git a/CVE-2013/CVE-2013-35xx/CVE-2013-3572.json b/CVE-2013/CVE-2013-35xx/CVE-2013-3572.json index 3e37e12d471..baf13040773 100644 --- a/CVE-2013/CVE-2013-35xx/CVE-2013-3572.json +++ b/CVE-2013/CVE-2013-35xx/CVE-2013-3572.json @@ -2,7 +2,7 @@ "id": "CVE-2013-3572", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-31T20:55:15.133", - "lastModified": "2019-06-10T18:34:15.460", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -81,7 +81,10 @@ }, { "url": "http://spaceblogs.org/shackspace/2013/10/shackspace-hacker-finds-flaw-in-ubiquiti-networks-unifi-products/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/64601", diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3925.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3925.json index ff8c63574eb..40076e4edff 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3925.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3925.json @@ -2,7 +2,7 @@ "id": "CVE-2013-3925", "sourceIdentifier": "cve@mitre.org", "published": "2013-07-01T21:55:02.170", - "lastModified": "2013-07-02T04:00:00.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -135,7 +135,8 @@ "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3926.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3926.json index 5ae6b1ff36c..0f3b3c8504c 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3926.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3926.json @@ -2,7 +2,7 @@ "id": "CVE-2013-3926", "sourceIdentifier": "cve@mitre.org", "published": "2013-07-01T21:55:03.090", - "lastModified": "2023-11-07T02:16:05.390", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/77.html\n\n'CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')'", "descriptions": [ @@ -87,7 +87,8 @@ "url": "http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2013/CVE-2013-60xx/CVE-2013-6039.json b/CVE-2013/CVE-2013-60xx/CVE-2013-6039.json index 0419e181927..054886a0603 100644 --- a/CVE-2013/CVE-2013-60xx/CVE-2013-6039.json +++ b/CVE-2013/CVE-2013-60xx/CVE-2013-6039.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6039", "sourceIdentifier": "cret@cert.org", "published": "2013-12-09T16:55:09.297", - "lastModified": "2013-12-13T05:22:00.417", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -79,6 +79,14 @@ "url": "http://jvn.jp/cert/JVNVU92648323/index.html", "source": "cret@cert.org" }, + { + "url": "http://osvdb.org/100612", + "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/55896", + "source": "cret@cert.org" + }, { "url": "http://www.kb.cert.org/vuls/id/268662", "source": "cret@cert.org", @@ -88,7 +96,10 @@ }, { "url": "http://www.nagiosql.org/forum8/solved-issues/3270-security-hotfix-for-nagiosql-3-2-sp2.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-62xx/CVE-2013-6226.json b/CVE-2013/CVE-2013-62xx/CVE-2013-6226.json index afaea28c8ab..7534f9c652a 100644 --- a/CVE-2013/CVE-2013-62xx/CVE-2013-6226.json +++ b/CVE-2013/CVE-2013-62xx/CVE-2013-6226.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6226", "sourceIdentifier": "cve@mitre.org", "published": "2013-11-14T20:55:05.137", - "lastModified": "2017-08-29T01:33:55.700", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -267,7 +267,8 @@ "url": "http://www.redfsec.com/CVE-2013-6226", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-62xx/CVE-2013-6227.json b/CVE-2013/CVE-2013-62xx/CVE-2013-6227.json index 7a192c2cdc5..c88c2cdde5e 100644 --- a/CVE-2013/CVE-2013-62xx/CVE-2013-6227.json +++ b/CVE-2013/CVE-2013-62xx/CVE-2013-6227.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6227", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-27T18:59:04.587", - "lastModified": "2019-01-19T11:29:00.307", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "evaluatorComment": "CWE-434: Unrestricted Upload of File with Dangerous Type", "descriptions": [ @@ -89,7 +89,10 @@ }, { "url": "http://www.redfsec.com/CVE-2013-6227", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://www.exploit-db.com/exploits/46206/", diff --git a/CVE-2013/CVE-2013-66xx/CVE-2013-6618.json b/CVE-2013/CVE-2013-66xx/CVE-2013-6618.json index e652f385b68..344cf21e70e 100644 --- a/CVE-2013/CVE-2013-66xx/CVE-2013-6618.json +++ b/CVE-2013/CVE-2013-66xx/CVE-2013-6618.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6618", "sourceIdentifier": "cve@mitre.org", "published": "2013-11-05T20:55:30.243", - "lastModified": "2017-08-29T01:33:58.967", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -119,6 +119,13 @@ "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/54731", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.exploit-db.com/exploits/29544", "source": "cve@mitre.org" @@ -138,7 +145,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-13-003", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-67xx/CVE-2013-6795.json b/CVE-2013/CVE-2013-67xx/CVE-2013-6795.json index a5264e1231e..42f563b7866 100644 --- a/CVE-2013/CVE-2013-67xx/CVE-2013-6795.json +++ b/CVE-2013/CVE-2013-67xx/CVE-2013-6795.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6795", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-24T18:55:20.793", - "lastModified": "2013-12-26T15:14:07.143", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -78,12 +78,23 @@ }, { "url": "http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/", + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://osvdb.org/100191", "source": "cve@mitre.org" }, { "url": "http://packetstormsecurity.com/files/124153/Rackspace-Windows-Agent-Updater-Arbitrary-Code-Execution.html", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/55775", + "source": "cve@mitre.org" + }, { "url": "https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver/commit/ef16f88f20254b8083e361f11707da25f8482401", "source": "cve@mitre.org", diff --git a/CVE-2013/CVE-2013-68xx/CVE-2013-6837.json b/CVE-2013/CVE-2013-68xx/CVE-2013-6837.json index 2484d4232d8..d2e172b7f88 100644 --- a/CVE-2013/CVE-2013-68xx/CVE-2013-6837.json +++ b/CVE-2013/CVE-2013-68xx/CVE-2013-6837.json @@ -2,7 +2,7 @@ "id": "CVE-2013-6837", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-19T04:24:57.447", - "lastModified": "2017-10-03T01:29:00.263", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -93,7 +93,10 @@ }, { "url": "http://www.perucrack.net/2014/07/haciendo-un-xss-en-plugin-prettyphoto.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html", diff --git a/CVE-2013/CVE-2013-72xx/CVE-2013-7241.json b/CVE-2013/CVE-2013-72xx/CVE-2013-7241.json index 476e31083b1..c12e8527397 100644 --- a/CVE-2013/CVE-2013-72xx/CVE-2013-7241.json +++ b/CVE-2013/CVE-2013-72xx/CVE-2013-7241.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7241", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-31T15:16:44.800", - "lastModified": "2016-12-31T02:59:09.357", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,7 +107,10 @@ }, { "url": "http://www.enkomio.com/Advisory/SOJOBO-ADV-13-01", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/62815", diff --git a/CVE-2013/CVE-2013-72xx/CVE-2013-7242.json b/CVE-2013/CVE-2013-72xx/CVE-2013-7242.json index c576a1a0d63..45090f0f6f0 100644 --- a/CVE-2013/CVE-2013-72xx/CVE-2013-7242.json +++ b/CVE-2013/CVE-2013-72xx/CVE-2013-7242.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7242", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-31T15:16:44.833", - "lastModified": "2016-12-31T02:59:09.437", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,7 +107,10 @@ }, { "url": "http://www.enkomio.com/Advisory/SOJOBO-ADV-13-01", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/62815", diff --git a/CVE-2013/CVE-2013-73xx/CVE-2013-7326.json b/CVE-2013/CVE-2013-73xx/CVE-2013-7326.json index 5991af30670..0d969cae1e0 100644 --- a/CVE-2013/CVE-2013-73xx/CVE-2013-7326.json +++ b/CVE-2013/CVE-2013-73xx/CVE-2013-7326.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7326", "sourceIdentifier": "cve@mitre.org", "published": "2014-02-14T19:55:26.717", - "lastModified": "2017-08-29T01:34:07.403", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -75,13 +75,20 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2013-12/0052.html", "source": "cve@mitre.org" }, + { + "url": "http://osvdb.org/100897", + "source": "cve@mitre.org" + }, { "url": "http://packetstormsecurity.com/files/124402", "source": "cve@mitre.org" }, { "url": "http://www.enkomio.com/Advisory/SOJOBO-ADV-13-05", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://www.securityfocus.com/bid/64236", diff --git a/CVE-2013/CVE-2013-74xx/CVE-2013-7428.json b/CVE-2013/CVE-2013-74xx/CVE-2013-7428.json index 103e1ab95fc..12e1b315cb7 100644 --- a/CVE-2013/CVE-2013-74xx/CVE-2013-7428.json +++ b/CVE-2013/CVE-2013-74xx/CVE-2013-7428.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7428", "sourceIdentifier": "cve@mitre.org", "published": "2017-09-07T16:29:00.190", - "lastModified": "2017-09-14T18:04:56.520", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,8 @@ "url": "http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/security-release-3-1-of-plugin-googlemaps.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-74xx/CVE-2013-7429.json b/CVE-2013/CVE-2013-74xx/CVE-2013-7429.json index cacea4713fc..b3e77f89c17 100644 --- a/CVE-2013/CVE-2013-74xx/CVE-2013-7429.json +++ b/CVE-2013/CVE-2013-74xx/CVE-2013-7429.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7429", "sourceIdentifier": "cve@mitre.org", "published": "2017-09-14T16:29:00.190", - "lastModified": "2017-09-27T20:03:06.650", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "url": "http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/security-release-3-1-of-plugin-googlemaps.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-74xx/CVE-2013-7430.json b/CVE-2013/CVE-2013-74xx/CVE-2013-7430.json index a1dfe6b646a..014711a5916 100644 --- a/CVE-2013/CVE-2013-74xx/CVE-2013-7430.json +++ b/CVE-2013/CVE-2013-74xx/CVE-2013-7430.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7430", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-28T19:29:00.197", - "lastModified": "2017-08-30T18:25:20.537", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "url": "http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/security-release-3-1-of-plugin-googlemaps.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-74xx/CVE-2013-7431.json b/CVE-2013/CVE-2013-74xx/CVE-2013-7431.json index e4069de4757..6a83d1989c6 100644 --- a/CVE-2013/CVE-2013-74xx/CVE-2013-7431.json +++ b/CVE-2013/CVE-2013-74xx/CVE-2013-7431.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7431", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-29T20:29:00.267", - "lastModified": "2017-09-01T16:08:47.733", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,8 @@ "source": "cve@mitre.org", "tags": [ "Release Notes", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-74xx/CVE-2013-7432.json b/CVE-2013/CVE-2013-74xx/CVE-2013-7432.json index 40e268a6ee9..dabefc1eb3d 100644 --- a/CVE-2013/CVE-2013-74xx/CVE-2013-7432.json +++ b/CVE-2013/CVE-2013-74xx/CVE-2013-7432.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7432", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-29T20:29:00.313", - "lastModified": "2017-09-01T16:33:49.873", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Release Notes", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2013/CVE-2013-74xx/CVE-2013-7433.json b/CVE-2013/CVE-2013-74xx/CVE-2013-7433.json index 5d26b74497d..2b1b00a3db4 100644 --- a/CVE-2013/CVE-2013-74xx/CVE-2013-7433.json +++ b/CVE-2013/CVE-2013-74xx/CVE-2013-7433.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7433", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-29T20:29:00.343", - "lastModified": "2017-09-01T16:05:49.727", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,8 @@ "source": "cve@mitre.org", "tags": [ "Release Notes", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-00xx/CVE-2014-0030.json b/CVE-2014/CVE-2014-00xx/CVE-2014-0030.json index c56fad80d8c..0adab35e4f2 100644 --- a/CVE-2014/CVE-2014-00xx/CVE-2014-0030.json +++ b/CVE-2014/CVE-2014-00xx/CVE-2014-0030.json @@ -2,7 +2,7 @@ "id": "CVE-2014-0030", "sourceIdentifier": "secalert@redhat.com", "published": "2017-10-10T01:30:20.250", - "lastModified": "2023-11-07T02:18:05.580", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -122,7 +122,8 @@ "url": "https://liftsecurity.io/advisories/Apache_Roller_XML-RPC_susceptible_to_XXE/", "source": "secalert@redhat.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1477.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1477.json index f40edc8cfe6..09a6add2f99 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1477.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1477.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1477", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.393", - "lastModified": "2020-08-07T19:36:58.497", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -278,6 +278,20 @@ } ], "references": [ + { + "url": "http://download.novell.com/Download?buildid=VYQsgaFpQ2k", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://download.novell.com/Download?buildid=Y2fux-JW1Qc", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html", "source": "security@mozilla.org", @@ -326,6 +340,13 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/102864", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0132.html", "source": "security@mozilla.org", @@ -340,6 +361,55 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56761", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56763", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56767", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56787", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56858", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56888", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2858", "source": "security@mozilla.org", @@ -414,6 +484,14 @@ "Third Party Advisory" ] }, + { + "url": "https://8pecxstudios.com/?page_id=44080", + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=921470", "source": "security@mozilla.org", diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1478.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1478.json index f8a85e15c90..2125942d0c5 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1478.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1478.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1478", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.783", - "lastModified": "2020-08-21T18:40:26.523", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -174,6 +174,13 @@ "Broken Link" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://secunia.com/advisories/56767", "source": "security@mozilla.org", @@ -266,7 +273,8 @@ "url": "https://8pecxstudios.com/?page_id=44080", "source": "security@mozilla.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1479.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1479.json index 4e8da6d54ac..3a20cbf6963 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1479.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1479.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1479", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.830", - "lastModified": "2020-08-10T20:57:01.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -278,6 +278,20 @@ } ], "references": [ + { + "url": "http://download.novell.com/Download?buildid=VYQsgaFpQ2k", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://download.novell.com/Download?buildid=Y2fux-JW1Qc", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html", "source": "security@mozilla.org", @@ -326,6 +340,13 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/102866", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0132.html", "source": "security@mozilla.org", @@ -340,6 +361,62 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56761", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56763", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56767", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56787", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56858", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56888", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56922", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2858", "source": "security@mozilla.org", @@ -414,6 +491,14 @@ "Third Party Advisory" ] }, + { + "url": "https://8pecxstudios.com/?page_id=44080", + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=911864", "source": "security@mozilla.org", diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1481.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1481.json index e4d29892aad..92c85fb522a 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1481.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1481.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1481", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.877", - "lastModified": "2020-08-11T13:14:53.927", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -278,6 +278,20 @@ } ], "references": [ + { + "url": "http://download.novell.com/Download?buildid=VYQsgaFpQ2k", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://download.novell.com/Download?buildid=Y2fux-JW1Qc", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html", "source": "security@mozilla.org", @@ -326,6 +340,13 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/102863", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0132.html", "source": "security@mozilla.org", @@ -340,6 +361,62 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56761", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56763", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56767", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56787", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56858", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56888", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56922", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2858", "source": "security@mozilla.org", @@ -414,6 +491,14 @@ "Third Party Advisory" ] }, + { + "url": "https://8pecxstudios.com/?page_id=44080", + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=936056", "source": "security@mozilla.org", diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1482.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1482.json index 688fad56624..881f5c54d60 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1482.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1482.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1482", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.893", - "lastModified": "2020-08-11T13:33:03.773", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -278,6 +278,20 @@ } ], "references": [ + { + "url": "http://download.novell.com/Download?buildid=VYQsgaFpQ2k", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://download.novell.com/Download?buildid=Y2fux-JW1Qc", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html", "source": "security@mozilla.org", @@ -326,6 +340,13 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/102868", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0132.html", "source": "security@mozilla.org", @@ -340,6 +361,62 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56761", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56763", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56767", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56787", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56858", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56888", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56922", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2858", "source": "security@mozilla.org", @@ -414,6 +491,14 @@ "Third Party Advisory" ] }, + { + "url": "https://8pecxstudios.com/?page_id=44080", + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=943803", "source": "security@mozilla.org", diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1483.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1483.json index e9a44f9757c..80a93f7cae6 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1483.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1483.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1483", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.910", - "lastModified": "2020-10-23T18:03:01.347", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -194,6 +194,13 @@ "Broken Link" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://secunia.com/advisories/56767", "source": "security@mozilla.org", @@ -271,7 +278,8 @@ "url": "https://8pecxstudios.com/?page_id=44080", "source": "security@mozilla.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1485.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1485.json index 389646b4faf..5e4b1b7e11c 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1485.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1485.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1485", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.957", - "lastModified": "2020-08-21T18:38:13.253", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -194,6 +194,13 @@ "Broken Link" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://secunia.com/advisories/56767", "source": "security@mozilla.org", @@ -271,7 +278,8 @@ "url": "https://8pecxstudios.com/?page_id=44080", "source": "security@mozilla.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1486.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1486.json index 113c97810d3..348c730c2d0 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1486.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1486.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1486", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:24.987", - "lastModified": "2020-08-07T19:37:42.170", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -258,6 +258,20 @@ } ], "references": [ + { + "url": "http://download.novell.com/Download?buildid=VYQsgaFpQ2k", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://download.novell.com/Download?buildid=Y2fux-JW1Qc", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html", "source": "security@mozilla.org", @@ -306,6 +320,13 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/102872", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0132.html", "source": "security@mozilla.org", @@ -320,6 +341,62 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56761", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56763", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56767", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56787", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56858", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56888", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56922", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2858", "source": "security@mozilla.org", @@ -394,6 +471,14 @@ "Third Party Advisory" ] }, + { + "url": "https://8pecxstudios.com/?page_id=44080", + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=942164", "source": "security@mozilla.org", diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1487.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1487.json index 47bd8748b0c..952c3677170 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1487.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1487.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1487", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:25.017", - "lastModified": "2020-08-11T13:38:37.910", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -278,6 +278,20 @@ } ], "references": [ + { + "url": "http://download.novell.com/Download?buildid=VYQsgaFpQ2k", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://download.novell.com/Download?buildid=Y2fux-JW1Qc", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html", "source": "security@mozilla.org", @@ -326,6 +340,13 @@ "Third Party Advisory" ] }, + { + "url": "http://osvdb.org/102873", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0132.html", "source": "security@mozilla.org", @@ -340,6 +361,62 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56761", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56763", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56767", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56787", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56858", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56888", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/56922", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.debian.org/security/2014/dsa-2858", "source": "security@mozilla.org", @@ -414,6 +491,14 @@ "Third Party Advisory" ] }, + { + "url": "https://8pecxstudios.com/?page_id=44080", + "source": "security@mozilla.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=947592", "source": "security@mozilla.org", diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1488.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1488.json index eceabf13072..899a73cc8b3 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1488.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1488.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1488", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:25.050", - "lastModified": "2020-08-21T18:37:54.767", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -189,6 +189,13 @@ "Broken Link" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://secunia.com/advisories/56767", "source": "security@mozilla.org", @@ -266,7 +273,8 @@ "url": "https://8pecxstudios.com/?page_id=44080", "source": "security@mozilla.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-14xx/CVE-2014-1490.json b/CVE-2014/CVE-2014-14xx/CVE-2014-1490.json index 98bee5c94e0..b9a4765a681 100644 --- a/CVE-2014/CVE-2014-14xx/CVE-2014-1490.json +++ b/CVE-2014/CVE-2014-14xx/CVE-2014-1490.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1490", "sourceIdentifier": "security@mozilla.org", "published": "2014-02-06T05:44:25.097", - "lastModified": "2020-07-31T20:28:31.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -304,6 +304,13 @@ "Not Applicable" ] }, + { + "url": "http://secunia.com/advisories/56706", + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] + }, { "url": "http://secunia.com/advisories/56767", "source": "security@mozilla.org", @@ -459,7 +466,8 @@ "url": "https://8pecxstudios.com/?page_id=44080", "source": "security@mozilla.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-16xx/CVE-2014-1618.json b/CVE-2014/CVE-2014-16xx/CVE-2014-1618.json index 84100c3e45f..f4f80aad337 100644 --- a/CVE-2014/CVE-2014-16xx/CVE-2014-1618.json +++ b/CVE-2014/CVE-2014-16xx/CVE-2014-1618.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1618", "sourceIdentifier": "cve@mitre.org", "published": "2014-01-21T15:17:12.477", - "lastModified": "2017-08-29T01:34:26.170", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,18 @@ } ], "references": [ + { + "url": "http://osvdb.org/101859", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/101899", + "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/101900", + "source": "cve@mitre.org" + }, { "url": "http://packetstormsecurity.com/files/124723/uaepdshopping-sql.txt", "source": "cve@mitre.org", @@ -78,11 +90,19 @@ "Exploit" ] }, + { + "url": "http://secunia.com/advisories/56351", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://www.iphobos.com/blog/2014/01/04/uaepd-script-multiple-sql-injection-vulnerabilty", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2014/CVE-2014-34xx/CVE-2014-3466.json b/CVE-2014/CVE-2014-34xx/CVE-2014-3466.json index 3c17634f4af..da0c0bc9237 100644 --- a/CVE-2014/CVE-2014-34xx/CVE-2014-3466.json +++ b/CVE-2014/CVE-2014-34xx/CVE-2014-3466.json @@ -2,7 +2,7 @@ "id": "CVE-2014-3466", "sourceIdentifier": "secalert@redhat.com", "published": "2014-06-03T14:55:10.257", - "lastModified": "2017-12-29T02:29:21.863", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -350,7 +350,8 @@ "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/", "source": "secalert@redhat.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { @@ -369,10 +370,46 @@ "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/58340", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/58598", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/58601", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/58642", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/59016", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/59021", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/59057", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/59086", + "source": "secalert@redhat.com" + }, { "url": "http://secunia.com/advisories/59408", "source": "secalert@redhat.com" }, + { + "url": "http://secunia.com/advisories/59838", + "source": "secalert@redhat.com" + }, { "url": "http://secunia.com/advisories/60384", "source": "secalert@redhat.com" diff --git a/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json b/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json index 01589217993..6f9fd5b4be9 100644 --- a/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json +++ b/CVE-2014/CVE-2014-39xx/CVE-2014-3961.json @@ -2,7 +2,7 @@ "id": "CVE-2014-3961", "sourceIdentifier": "cve@mitre.org", "published": "2014-06-04T14:55:07.047", - "lastModified": "2014-06-05T14:48:59.443", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -112,6 +112,10 @@ } ], "references": [ + { + "url": "http://osvdb.org/show/osvdb/107626", + "source": "cve@mitre.org" + }, { "url": "http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html", "source": "cve@mitre.org", @@ -148,7 +152,8 @@ "url": "https://www.yarubo.com/advisories/1", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json index cd732d6df37..2f703a108f7 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9569.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9569", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-07T19:59:03.933", - "lastModified": "2017-01-03T02:59:24.987", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -71,6 +71,10 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/62017", + "source": "cve@mitre.org" + }, { "url": "http://www.securitytracker.com/id/1031509", "source": "cve@mitre.org" @@ -79,7 +83,8 @@ "url": "http://www.senseofsecurity.com.au/advisories/SOS-14-005", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] } ] diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json index fa4e702ba59..f0ebc6633e2 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9597.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9597", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:17:08.573", - "lastModified": "2017-07-01T01:29:09.247", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "http://www.binarysniper.net/2015/01/vlc-media-player-215-memory-corruption.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://security.gentoo.org/glsa/201603-08", diff --git a/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json b/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json index 6d137225e01..d425a97fdd8 100644 --- a/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json +++ b/CVE-2014/CVE-2014-95xx/CVE-2014-9598.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9598", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-21T15:17:10.027", - "lastModified": "2017-07-01T01:29:09.297", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -77,7 +77,10 @@ }, { "url": "http://www.binarysniper.net/2015/01/vlc-media-player-215-memory-corruption.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "https://security.gentoo.org/glsa/201603-08", diff --git a/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json b/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json index 87d2161385a..446a01545e5 100644 --- a/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json +++ b/CVE-2015/CVE-2015-02xx/CVE-2015-0235.json @@ -2,7 +2,7 @@ "id": "CVE-2015-0235", "sourceIdentifier": "secalert@redhat.com", "published": "2015-01-28T19:59:00.063", - "lastModified": "2022-07-05T18:42:42.710", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -507,6 +507,111 @@ "Third Party Advisory" ] }, + { + "url": "http://secunia.com/advisories/62517", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62640", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62667", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62680", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62681", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62688", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62690", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62691", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62692", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62698", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62715", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62758", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62812", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62813", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/62816", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, { "url": "http://secunia.com/advisories/62865", "source": "secalert@redhat.com", @@ -637,7 +742,8 @@ "url": "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf", "source": "secalert@redhat.com", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2015/CVE-2015-64xx/CVE-2015-6496.json b/CVE-2015/CVE-2015-64xx/CVE-2015-6496.json index 377b902bc23..b221635ba05 100644 --- a/CVE-2015/CVE-2015-64xx/CVE-2015-6496.json +++ b/CVE-2015/CVE-2015-64xx/CVE-2015-6496.json @@ -2,7 +2,7 @@ "id": "CVE-2015-6496", "sourceIdentifier": "secalert@redhat.com", "published": "2015-08-24T14:59:12.103", - "lastModified": "2018-05-22T15:22:15.637", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -151,7 +151,8 @@ "source": "secalert@redhat.com", "tags": [ "Patch", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2015/CVE-2015-92xx/CVE-2015-9284.json b/CVE-2015/CVE-2015-92xx/CVE-2015-9284.json index 0d1ef164ea6..8a7e2062190 100644 --- a/CVE-2015/CVE-2015-92xx/CVE-2015-9284.json +++ b/CVE-2015/CVE-2015-92xx/CVE-2015-9284.json @@ -2,7 +2,7 @@ "id": "CVE-2015-9284", "sourceIdentifier": "support@hackerone.com", "published": "2019-04-26T15:29:00.267", - "lastModified": "2020-11-13T16:35:37.780", + "lastModified": "2024-02-14T16:29:38.470", "vulnStatus": "Analyzed", "descriptions": [ { @@ -95,8 +95,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:omniauth:omniauth:*:*:*:*:*:ruby:*:*", - "versionEndIncluding": "1.9.1", - "matchCriteriaId": "DDD57FFF-8BDA-49DB-A596-508898135D9E" + "versionEndExcluding": "2.0.0", + "matchCriteriaId": "E7DFDC87-A880-470C-8850-4137441C3745" } ] } diff --git a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000115.json b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000115.json index 5e71ae3b136..c8c15f93ed8 100644 --- a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000115.json +++ b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000115.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1000115", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-21T14:59:00.183", - "lastModified": "2017-11-13T16:17:42.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -101,7 +101,8 @@ "url": "http://huge-it.com/joomla-portfolio-gallery/", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000116.json b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000116.json index 291c920ea08..1cdb8864a94 100644 --- a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000116.json +++ b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000116.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1000116", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-21T14:59:01.870", - "lastModified": "2017-03-28T01:59:00.397", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -101,7 +101,8 @@ "url": "http://huge-it.com/joomla-portfolio-gallery/", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000123.json b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000123.json index 6c4f3b65126..84effe8612e 100644 --- a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000123.json +++ b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000123.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1000123", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-06T14:59:21.397", - "lastModified": "2017-09-06T01:29:00.453", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://huge-it.com/joomla-video-gallery/", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000124.json b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000124.json index 4c268634513..d029ea58eac 100644 --- a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000124.json +++ b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000124.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1000124", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-06T14:59:22.257", - "lastModified": "2017-09-06T01:29:00.500", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://huge-it.com/joomla-portfolio-gallery/", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000125.json b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000125.json index 2c64db0a0f9..d0e7495083e 100644 --- a/CVE-2016/CVE-2016-10001xx/CVE-2016-1000125.json +++ b/CVE-2016/CVE-2016-10001xx/CVE-2016-1000125.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1000125", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-06T14:59:23.333", - "lastModified": "2017-09-06T01:29:00.547", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://huge-it.com/joomla-catalog/", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-100xx/CVE-2016-10033.json b/CVE-2016/CVE-2016-100xx/CVE-2016-10033.json index 02f4ef121ca..073ab49263c 100644 --- a/CVE-2016/CVE-2016-100xx/CVE-2016-10033.json +++ b/CVE-2016/CVE-2016-100xx/CVE-2016-10033.json @@ -2,7 +2,7 @@ "id": "CVE-2016-10033", "sourceIdentifier": "cve@mitre.org", "published": "2016-12-30T19:59:00.137", - "lastModified": "2021-09-30T16:30:42.553", + "lastModified": "2024-02-14T14:56:08.527", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-77" + "value": "CWE-88" } ] } @@ -166,6 +166,7 @@ "url": "http://www.securityfocus.com/archive/1/539963/100/0/threaded", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -174,6 +175,7 @@ "url": "http://www.securityfocus.com/bid/95108", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Third Party Advisory", "VDB Entry" @@ -183,6 +185,7 @@ "url": "http://www.securitytracker.com/id/1037533", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2016/CVE-2016-100xx/CVE-2016-10098.json b/CVE-2016/CVE-2016-100xx/CVE-2016-10098.json index ebcddb0d56e..b43b366209d 100644 --- a/CVE-2016/CVE-2016-100xx/CVE-2016-10098.json +++ b/CVE-2016/CVE-2016-100xx/CVE-2016-10098.json @@ -2,7 +2,7 @@ "id": "CVE-2016-10098", "sourceIdentifier": "cve@mitre.org", "published": "2017-02-05T18:59:00.133", - "lastModified": "2017-02-10T02:59:01.090", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -141,7 +141,8 @@ "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json index 9775fe21ac2..b98d4e7372b 100644 --- a/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json +++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1328.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1328", "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-07-03T21:59:04.540", - "lastModified": "2018-10-09T19:59:05.973", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -109,7 +109,8 @@ "url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json index 3c4ed97c236..226b94dcf73 100644 --- a/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json +++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1336.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1336", "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-07-03T21:59:05.633", - "lastModified": "2018-10-09T19:59:06.333", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -109,7 +109,8 @@ "url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json index ccda0d9e889..c275a931355 100644 --- a/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json +++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1337.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1337", "sourceIdentifier": "ykramarz@cisco.com", "published": "2016-07-03T21:59:06.727", - "lastModified": "2018-10-09T19:59:06.707", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -113,7 +113,8 @@ "url": "http://secorda.com/multiple-security-vulnerabilities-affecting-cisco-epc3928/", "source": "ykramarz@cisco.com", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-25xx/CVE-2016-2555.json b/CVE-2016/CVE-2016-25xx/CVE-2016-2555.json index 80cc6878f55..9101e573d43 100644 --- a/CVE-2016/CVE-2016-25xx/CVE-2016-2555.json +++ b/CVE-2016/CVE-2016-25xx/CVE-2016-2555.json @@ -2,7 +2,7 @@ "id": "CVE-2016-2555", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-13T14:59:01.637", - "lastModified": "2017-09-08T01:29:54.920", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-44xx/CVE-2016-4462.json b/CVE-2016/CVE-2016-44xx/CVE-2016-4462.json index 7ffb49c6c00..7280c9d368d 100644 --- a/CVE-2016/CVE-2016-44xx/CVE-2016-4462.json +++ b/CVE-2016/CVE-2016-44xx/CVE-2016-4462.json @@ -2,7 +2,7 @@ "id": "CVE-2016-4462", "sourceIdentifier": "security@apache.org", "published": "2017-08-30T17:29:00.200", - "lastModified": "2017-09-12T13:56:18.040", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -182,7 +182,8 @@ "url": "http://git.net/ml/dev.ofbiz.apache.org/2016-11/msg00180.html", "source": "security@apache.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2016/CVE-2016-87xx/CVE-2016-8769.json b/CVE-2016/CVE-2016-87xx/CVE-2016-8769.json index cde40bfd4d8..3e3bfce7111 100644 --- a/CVE-2016/CVE-2016-87xx/CVE-2016-8769.json +++ b/CVE-2016/CVE-2016-87xx/CVE-2016-8769.json @@ -2,7 +2,7 @@ "id": "CVE-2016-8769", "sourceIdentifier": "psirt@huawei.com", "published": "2017-04-02T20:59:01.390", - "lastModified": "2021-08-27T13:48:10.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "url": "http://www.security-geek.in/2017/02/07/0day-discovery-system-level-access-by-privilege-escalation-of-huawei-manufactured-airtel-photon-dongles/", "source": "psirt@huawei.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2016/CVE-2016-95xx/CVE-2016-9564.json b/CVE-2016/CVE-2016-95xx/CVE-2016-9564.json index d31915c596e..1f48943a183 100644 --- a/CVE-2016/CVE-2016-95xx/CVE-2016-9564.json +++ b/CVE-2016/CVE-2016-95xx/CVE-2016-9564.json @@ -2,7 +2,7 @@ "id": "CVE-2016-9564", "sourceIdentifier": "cve@mitre.org", "published": "2016-11-30T11:59:28.173", - "lastModified": "2016-12-03T03:27:51.190", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Technical Description" + "Technical Description", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-10000xx/CVE-2017-1000054.json b/CVE-2017/CVE-2017-10000xx/CVE-2017-1000054.json index 3e0029e1f1d..d8282bdf184 100644 --- a/CVE-2017/CVE-2017-10000xx/CVE-2017-1000054.json +++ b/CVE-2017/CVE-2017-10000xx/CVE-2017-1000054.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1000054", "sourceIdentifier": "cve@mitre.org", "published": "2017-07-17T13:18:17.673", - "lastModified": "2017-07-19T17:38:24.857", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -452,7 +452,8 @@ "url": "https://www.theblazehen.com/posts/CVE-2017-xxxxxx-rocketchat-xss-with-markdown-url-handling-in-messages/", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-111xx/CVE-2017-11169.json b/CVE-2017/CVE-2017-111xx/CVE-2017-11169.json index e829d6504af..a3f7c3813ae 100644 --- a/CVE-2017/CVE-2017-111xx/CVE-2017-11169.json +++ b/CVE-2017/CVE-2017-111xx/CVE-2017-11169.json @@ -2,7 +2,7 @@ "id": "CVE-2017-11169", "sourceIdentifier": "cve@mitre.org", "published": "2017-11-13T09:29:00.263", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-114xx/CVE-2017-11467.json b/CVE-2017/CVE-2017-114xx/CVE-2017-11467.json index 6331e80601e..d4414c3ba2e 100644 --- a/CVE-2017/CVE-2017-114xx/CVE-2017-11467.json +++ b/CVE-2017/CVE-2017-114xx/CVE-2017-11467.json @@ -2,7 +2,7 @@ "id": "CVE-2017-11467", "sourceIdentifier": "cve@mitre.org", "published": "2017-07-20T00:29:00.433", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json index 1856df0f50b..63a189788de 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12637.json @@ -2,7 +2,7 @@ "id": "CVE-2017-12637", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-07T20:29:01.120", - "lastModified": "2021-04-20T19:31:22.273", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.sh0w.top/index.php/archives/7/", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-129xx/CVE-2017-12906.json b/CVE-2017/CVE-2017-129xx/CVE-2017-12906.json index c7afa3f18f4..f7e9be27996 100644 --- a/CVE-2017/CVE-2017-129xx/CVE-2017-12906.json +++ b/CVE-2017/CVE-2017-129xx/CVE-2017-12906.json @@ -2,7 +2,7 @@ "id": "CVE-2017-12906", "sourceIdentifier": "cve@mitre.org", "published": "2017-09-07T13:29:00.543", - "lastModified": "2017-09-13T14:23:55.897", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-142xx/CVE-2017-14219.json b/CVE-2017/CVE-2017-142xx/CVE-2017-14219.json index 011556ca81e..3d471c6a90c 100644 --- a/CVE-2017/CVE-2017-142xx/CVE-2017-14219.json +++ b/CVE-2017/CVE-2017-142xx/CVE-2017-14219.json @@ -2,7 +2,7 @@ "id": "CVE-2017-14219", "sourceIdentifier": "cve@mitre.org", "published": "2017-09-07T22:29:00.217", - "lastModified": "2017-09-19T17:38:52.990", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-149xx/CVE-2017-14942.json b/CVE-2017/CVE-2017-149xx/CVE-2017-14942.json index 5a71721f8be..90fb2e8c6a8 100644 --- a/CVE-2017/CVE-2017-149xx/CVE-2017-14942.json +++ b/CVE-2017/CVE-2017-149xx/CVE-2017-14942.json @@ -2,7 +2,7 @@ "id": "CVE-2017-14942", "sourceIdentifier": "cve@mitre.org", "published": "2017-09-30T01:29:02.727", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -109,7 +109,8 @@ "url": "http://whiteboyz.xyz/authentication-bypass-intelbras-wrn-150.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-149xx/CVE-2017-14992.json b/CVE-2017/CVE-2017-149xx/CVE-2017-14992.json index 576910c2fbc..d99ae224686 100644 --- a/CVE-2017/CVE-2017-149xx/CVE-2017-14992.json +++ b/CVE-2017/CVE-2017-149xx/CVE-2017-14992.json @@ -2,7 +2,7 @@ "id": "CVE-2017-14992", "sourceIdentifier": "cve@mitre.org", "published": "2017-11-01T17:29:00.277", - "lastModified": "2017-11-22T17:54:59.523", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -138,7 +138,8 @@ "url": "https://blog.cloudpassage.com/2017/10/13/discovering-docker-cve-2017-14992/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-153xx/CVE-2017-15378.json b/CVE-2017/CVE-2017-153xx/CVE-2017-15378.json index 1b35ec742ab..02edf69efcd 100644 --- a/CVE-2017/CVE-2017-153xx/CVE-2017-15378.json +++ b/CVE-2017/CVE-2017-153xx/CVE-2017-15378.json @@ -2,7 +2,7 @@ "id": "CVE-2017-15378", "sourceIdentifier": "cve@mitre.org", "published": "2017-10-23T08:29:00.493", - "lastModified": "2017-10-31T22:03:33.200", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-153xx/CVE-2017-15379.json b/CVE-2017/CVE-2017-153xx/CVE-2017-15379.json index 40a4fdc1569..776bbf1d25c 100644 --- a/CVE-2017/CVE-2017-153xx/CVE-2017-15379.json +++ b/CVE-2017/CVE-2017-153xx/CVE-2017-15379.json @@ -2,7 +2,7 @@ "id": "CVE-2017-15379", "sourceIdentifier": "cve@mitre.org", "published": "2017-10-23T08:29:00.570", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://whiteboyz.xyz/esic-software-publico-autentication-bypass.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-153xx/CVE-2017-15380.json b/CVE-2017/CVE-2017-153xx/CVE-2017-15380.json index d663e324dfc..09df04a83fd 100644 --- a/CVE-2017/CVE-2017-153xx/CVE-2017-15380.json +++ b/CVE-2017/CVE-2017-153xx/CVE-2017-15380.json @@ -2,7 +2,7 @@ "id": "CVE-2017-15380", "sourceIdentifier": "cve@mitre.org", "published": "2017-10-23T08:29:00.617", - "lastModified": "2017-10-31T22:02:23.137", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-168xx/CVE-2017-16894.json b/CVE-2017/CVE-2017-168xx/CVE-2017-16894.json index 2b61a3bb897..fc612dc8de0 100644 --- a/CVE-2017/CVE-2017-168xx/CVE-2017-16894.json +++ b/CVE-2017/CVE-2017-168xx/CVE-2017-16894.json @@ -2,7 +2,7 @@ "id": "CVE-2017-16894", "sourceIdentifier": "cve@mitre.org", "published": "2017-11-20T01:29:00.227", - "lastModified": "2018-03-09T02:29:01.043", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -102,7 +102,8 @@ "url": "http://whiteboyz.xyz/laravel-env-file-vuln.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-169xx/CVE-2017-16900.json b/CVE-2017/CVE-2017-169xx/CVE-2017-16900.json index 6261cc4b294..1608598b86b 100644 --- a/CVE-2017/CVE-2017-169xx/CVE-2017-16900.json +++ b/CVE-2017/CVE-2017-169xx/CVE-2017-16900.json @@ -2,7 +2,7 @@ "id": "CVE-2017-16900", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-27T18:15:11.263", - "lastModified": "2020-03-04T17:40:22.197", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -104,7 +104,8 @@ "url": "http://i-onenet.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-177xx/CVE-2017-17749.json b/CVE-2017/CVE-2017-177xx/CVE-2017-17749.json index 515cacd4a98..61aa083dfd0 100644 --- a/CVE-2017/CVE-2017-177xx/CVE-2017-17749.json +++ b/CVE-2017/CVE-2017-177xx/CVE-2017-17749.json @@ -2,7 +2,7 @@ "id": "CVE-2017-17749", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-24T18:29:00.237", - "lastModified": "2018-04-19T17:29:26.677", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -103,7 +103,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-177xx/CVE-2017-17750.json b/CVE-2017/CVE-2017-177xx/CVE-2017-17750.json index 328a3061900..49d17b296f7 100644 --- a/CVE-2017/CVE-2017-177xx/CVE-2017-17750.json +++ b/CVE-2017/CVE-2017-177xx/CVE-2017-17750.json @@ -2,7 +2,7 @@ "id": "CVE-2017-17750", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-24T18:29:00.317", - "lastModified": "2018-04-19T17:29:22.833", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -102,7 +102,8 @@ "url": "http://aryanitin.com/2017-12-20-CVE-2017-17750/", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-177xx/CVE-2017-17751.json b/CVE-2017/CVE-2017-177xx/CVE-2017-17751.json index 637d303df25..88aa20c675e 100644 --- a/CVE-2017/CVE-2017-177xx/CVE-2017-17751.json +++ b/CVE-2017/CVE-2017-177xx/CVE-2017-17751.json @@ -2,7 +2,7 @@ "id": "CVE-2017-17751", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-24T18:29:00.377", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -103,7 +103,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-51xx/CVE-2017-5136.json b/CVE-2017/CVE-2017-51xx/CVE-2017-5136.json index e2647989794..318608d6b07 100644 --- a/CVE-2017/CVE-2017-51xx/CVE-2017-5136.json +++ b/CVE-2017/CVE-2017-51xx/CVE-2017-5136.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5136", "sourceIdentifier": "cve@mitre.org", "published": "2017-02-05T18:59:00.197", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -144,7 +144,8 @@ "url": "https://niantech.io/blog/2017/02/05/vulns-multiple-vulns-in-sendquick-entera-avera-sms-gateway-appliances/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-51xx/CVE-2017-5137.json b/CVE-2017/CVE-2017-51xx/CVE-2017-5137.json index 7799ffe4cf5..dcbc56d6400 100644 --- a/CVE-2017/CVE-2017-51xx/CVE-2017-5137.json +++ b/CVE-2017/CVE-2017-51xx/CVE-2017-5137.json @@ -2,7 +2,7 @@ "id": "CVE-2017-5137", "sourceIdentifier": "cve@mitre.org", "published": "2017-02-05T18:59:00.227", - "lastModified": "2017-02-09T21:59:34.467", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -144,7 +144,8 @@ "url": "https://niantech.io/blog/2017/02/05/vulns-multiple-vulns-in-sendquick-entera-avera-sms-gateway-appliances/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-65xx/CVE-2017-6564.json b/CVE-2017/CVE-2017-65xx/CVE-2017-6564.json index fd85fe8cbec..64ef1b9bc18 100644 --- a/CVE-2017/CVE-2017-65xx/CVE-2017-6564.json +++ b/CVE-2017/CVE-2017-65xx/CVE-2017-6564.json @@ -2,7 +2,7 @@ "id": "CVE-2017-6564", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-01T19:59:00.160", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "source": "cve@mitre.org", "tags": [ "Technical Description", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-65xx/CVE-2017-6565.json b/CVE-2017/CVE-2017-65xx/CVE-2017-6565.json index 232748b7727..4d523815e52 100644 --- a/CVE-2017/CVE-2017-65xx/CVE-2017-6565.json +++ b/CVE-2017/CVE-2017-65xx/CVE-2017-6565.json @@ -2,7 +2,7 @@ "id": "CVE-2017-6565", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-01T19:59:00.207", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "source": "cve@mitre.org", "tags": [ "Technical Description", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7255.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7255.json index 58b5a229eb6..15c84c8fc2c 100644 --- a/CVE-2017/CVE-2017-72xx/CVE-2017-7255.json +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7255.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7255", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-24T15:59:01.327", - "lastModified": "2017-04-05T01:59:01.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7256.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7256.json index 7d46820f64d..b9efb3bd8e4 100644 --- a/CVE-2017/CVE-2017-72xx/CVE-2017-7256.json +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7256.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7256", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-24T15:59:01.357", - "lastModified": "2017-03-31T01:59:01.690", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7257.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7257.json index e86cd97ee21..03fd06b2b2c 100644 --- a/CVE-2017/CVE-2017-72xx/CVE-2017-7257.json +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7257.json @@ -2,7 +2,7 @@ "id": "CVE-2017-7257", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-24T15:59:01.387", - "lastModified": "2017-03-31T01:59:01.737", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-92xx/CVE-2017-9251.json b/CVE-2017/CVE-2017-92xx/CVE-2017-9251.json index 59aa6c4d104..4ac55406f97 100644 --- a/CVE-2017/CVE-2017-92xx/CVE-2017-9251.json +++ b/CVE-2017/CVE-2017-92xx/CVE-2017-9251.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9251", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-28T20:29:00.247", - "lastModified": "2017-06-08T13:36:15.007", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://sebao.me/index.php/post/13.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-92xx/CVE-2017-9252.json b/CVE-2017/CVE-2017-92xx/CVE-2017-9252.json index 2d56db9b350..e9a7fb64ea8 100644 --- a/CVE-2017/CVE-2017-92xx/CVE-2017-9252.json +++ b/CVE-2017/CVE-2017-92xx/CVE-2017-9252.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9252", "sourceIdentifier": "cve@mitre.org", "published": "2017-05-28T20:29:00.277", - "lastModified": "2017-06-08T13:48:25.647", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.sebao.me/index.php/post/14.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2017/CVE-2017-99xx/CVE-2017-9978.json b/CVE-2017/CVE-2017-99xx/CVE-2017-9978.json index 35b265d3eee..142166e4b89 100644 --- a/CVE-2017/CVE-2017-99xx/CVE-2017-9978.json +++ b/CVE-2017/CVE-2017-99xx/CVE-2017-9978.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9978", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-28T19:29:01.463", - "lastModified": "2017-09-08T02:28:43.450", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -117,7 +117,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2017/CVE-2017-99xx/CVE-2017-9979.json b/CVE-2017/CVE-2017-99xx/CVE-2017-9979.json index 909dde0b7f4..4e9c86093cd 100644 --- a/CVE-2017/CVE-2017-99xx/CVE-2017-9979.json +++ b/CVE-2017/CVE-2017-99xx/CVE-2017-9979.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9979", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-28T19:29:01.497", - "lastModified": "2017-09-08T02:28:59.920", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -117,7 +117,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-05xx/CVE-2018-0501.json b/CVE-2018/CVE-2018-05xx/CVE-2018-0501.json index 0ac88e37fb1..283730a80df 100644 --- a/CVE-2018/CVE-2018-05xx/CVE-2018-0501.json +++ b/CVE-2018/CVE-2018-05xx/CVE-2018-0501.json @@ -2,7 +2,7 @@ "id": "CVE-2018-0501", "sourceIdentifier": "security@debian.org", "published": "2018-08-21T00:29:00.227", - "lastModified": "2019-01-17T18:49:46.183", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -129,7 +129,8 @@ "url": "https://mirror.fail", "source": "security@debian.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-07xx/CVE-2018-0748.json b/CVE-2018/CVE-2018-07xx/CVE-2018-0748.json index 2c72559a2bc..56a7ae78bae 100644 --- a/CVE-2018/CVE-2018-07xx/CVE-2018-0748.json +++ b/CVE-2018/CVE-2018-07xx/CVE-2018-0748.json @@ -2,7 +2,7 @@ "id": "CVE-2018-0748", "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-04T14:29:00.487", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -178,7 +178,8 @@ "url": "https://95cnsec.com/windows-kernel-cve-2018-0748-exploit.html", "source": "secure@microsoft.com", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-07xx/CVE-2018-0749.json b/CVE-2018/CVE-2018-07xx/CVE-2018-0749.json index c8d1126a185..49092f7520a 100644 --- a/CVE-2018/CVE-2018-07xx/CVE-2018-0749.json +++ b/CVE-2018/CVE-2018-07xx/CVE-2018-0749.json @@ -2,7 +2,7 @@ "id": "CVE-2018-0749", "sourceIdentifier": "secure@microsoft.com", "published": "2018-01-04T14:29:00.533", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -178,7 +178,8 @@ "url": "https://95cnsec.com/windows-smb-cve-2018-0749-exploit.html", "source": "secure@microsoft.com", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-102xx/CVE-2018-10267.json b/CVE-2018/CVE-2018-102xx/CVE-2018-10267.json index 3f1b4710e93..06bac8456a2 100644 --- a/CVE-2018/CVE-2018-102xx/CVE-2018-10267.json +++ b/CVE-2018/CVE-2018-102xx/CVE-2018-10267.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10267", "sourceIdentifier": "cve@mitre.org", "published": "2018-04-22T01:29:01.643", - "lastModified": "2018-05-25T14:33:14.190", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-103xx/CVE-2018-10362.json b/CVE-2018/CVE-2018-103xx/CVE-2018-10362.json index 10063e744c0..dce0fbb6f42 100644 --- a/CVE-2018/CVE-2018-103xx/CVE-2018-10362.json +++ b/CVE-2018/CVE-2018-103xx/CVE-2018-10362.json @@ -2,7 +2,7 @@ "id": "CVE-2018-10362", "sourceIdentifier": "cve@mitre.org", "published": "2018-04-25T05:29:00.313", - "lastModified": "2018-06-13T11:34:25.677", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -100,7 +100,8 @@ "source": "cve@mitre.org", "tags": [ "Technical Description", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-113xx/CVE-2018-11338.json b/CVE-2018/CVE-2018-113xx/CVE-2018-11338.json index e8347524aa8..9f3ffdec161 100644 --- a/CVE-2018/CVE-2018-113xx/CVE-2018-11338.json +++ b/CVE-2018/CVE-2018-113xx/CVE-2018-11338.json @@ -2,7 +2,7 @@ "id": "CVE-2018-11338", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-31T14:29:00.387", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "url": "https://corporateblue.com/your-taxes-are-being-leaked/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-120xx/CVE-2018-12076.json b/CVE-2018/CVE-2018-120xx/CVE-2018-12076.json index d1c715e8e68..0236eb4b9f2 100644 --- a/CVE-2018/CVE-2018-120xx/CVE-2018-12076.json +++ b/CVE-2018/CVE-2018-120xx/CVE-2018-12076.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12076", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-13T19:29:00.213", - "lastModified": "2019-02-06T17:37:47.683", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "https://sorsnce.com/2018/11/13/announcing-cve-2018-12076/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-122xx/CVE-2018-12234.json b/CVE-2018/CVE-2018-122xx/CVE-2018-12234.json index c05e77f76c1..425baf11713 100644 --- a/CVE-2018/CVE-2018-122xx/CVE-2018-12234.json +++ b/CVE-2018/CVE-2018-122xx/CVE-2018-12234.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12234", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-06T23:29:00.240", - "lastModified": "2019-11-12T18:15:10.283", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -107,7 +107,10 @@ }, { "url": "https://www.thecysec.in/2020/04/xxs-adrenalin-generalinfo-cve-id.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-143xx/CVE-2018-14399.json b/CVE-2018/CVE-2018-143xx/CVE-2018-14399.json index d3dfc14dc9e..0ad50282b8a 100644 --- a/CVE-2018/CVE-2018-143xx/CVE-2018-14399.json +++ b/CVE-2018/CVE-2018-143xx/CVE-2018-14399.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14399", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-19T05:29:00.350", - "lastModified": "2018-09-17T18:32:51.913", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.an-sheng.cc/index.php/archives/4/", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-146xx/CVE-2018-14607.json b/CVE-2018/CVE-2018-146xx/CVE-2018-14607.json index 14184e8d530..198c66dbb93 100644 --- a/CVE-2018/CVE-2018-146xx/CVE-2018-14607.json +++ b/CVE-2018/CVE-2018-146xx/CVE-2018-14607.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14607", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-26T22:29:00.210", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-146xx/CVE-2018-14608.json b/CVE-2018/CVE-2018-146xx/CVE-2018-14608.json index e8a32799834..246db8d4076 100644 --- a/CVE-2018/CVE-2018-146xx/CVE-2018-14608.json +++ b/CVE-2018/CVE-2018-146xx/CVE-2018-14608.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14608", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-26T22:29:00.273", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -110,7 +110,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-148xx/CVE-2018-14869.json b/CVE-2018/CVE-2018-148xx/CVE-2018-14869.json index 64dac00144f..57812ed77b5 100644 --- a/CVE-2018/CVE-2018-148xx/CVE-2018-14869.json +++ b/CVE-2018/CVE-2018-148xx/CVE-2018-14869.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14869", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-06T21:29:00.517", - "lastModified": "2018-10-04T13:17:17.267", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -93,6 +93,14 @@ } ], "references": [ + { + "url": "https://googlequeens.com/2018/08/03/cve-2018-14869-php-template-store-script-3-0-6-stored-xss-vulnerability/", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://www.exploit-db.com/exploits/45143/", "source": "cve@mitre.org", diff --git a/CVE-2018/CVE-2018-149xx/CVE-2018-14936.json b/CVE-2018/CVE-2018-149xx/CVE-2018-14936.json index d1a8923bbb9..636fd45af54 100644 --- a/CVE-2018/CVE-2018-149xx/CVE-2018-14936.json +++ b/CVE-2018/CVE-2018-149xx/CVE-2018-14936.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14936", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-05T01:29:00.823", - "lastModified": "2018-09-27T17:11:23.977", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-149xx/CVE-2018-14937.json b/CVE-2018/CVE-2018-149xx/CVE-2018-14937.json index a22eed0ad79..ab3a395ceb3 100644 --- a/CVE-2018/CVE-2018-149xx/CVE-2018-14937.json +++ b/CVE-2018/CVE-2018-149xx/CVE-2018-14937.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14937", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-05T01:29:00.867", - "lastModified": "2018-09-27T17:03:28.893", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-155xx/CVE-2018-15569.json b/CVE-2018/CVE-2018-155xx/CVE-2018-15569.json index 31b1f90bdd3..598751a59f1 100644 --- a/CVE-2018/CVE-2018-155xx/CVE-2018-15569.json +++ b/CVE-2018/CVE-2018-155xx/CVE-2018-15569.json @@ -2,7 +2,7 @@ "id": "CVE-2018-15569", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-20T01:29:00.953", - "lastModified": "2018-10-12T20:29:01.727", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://owendarlene.com/csrf-my-little-forum/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-163xx/CVE-2018-16326.json b/CVE-2018/CVE-2018-163xx/CVE-2018-16326.json index 691ec5c384b..81e37fdd15e 100644 --- a/CVE-2018/CVE-2018-163xx/CVE-2018-16326.json +++ b/CVE-2018/CVE-2018-163xx/CVE-2018-16326.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16326", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-04T21:29:00.780", - "lastModified": "2018-11-20T17:38:37.153", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16431.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16431.json index e0fba99790a..7abd32e6756 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16431.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16431.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16431", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-04T00:29:01.947", - "lastModified": "2018-11-02T18:48:38.317", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16432.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16432.json index 6f87acdc05c..55aa48b5534 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16432.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16432.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16432", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-04T00:29:02.073", - "lastModified": "2018-10-25T01:24:22.517", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16453.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16453.json index be76d1a53e9..0fa01672ae8 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16453.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16453.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16453", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-04T21:29:00.907", - "lastModified": "2018-11-20T13:54:21.450", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16454.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16454.json index 9507c6af6b0..157584633b7 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16454.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16454.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16454", "sourceIdentifier": "cve@mitre.org", "published": "2018-09-07T22:29:02.087", - "lastModified": "2018-10-09T16:38:00.077", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16455.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16455.json index 308fcd96278..dad6cf405fd 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16455.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16455.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16455", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-04T21:29:01.017", - "lastModified": "2020-02-18T21:44:38.630", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16456.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16456.json index e1a30a661f8..5f31a63b5b8 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16456.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16456.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16456", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-04T21:29:01.127", - "lastModified": "2018-11-20T18:10:08.530", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-164xx/CVE-2018-16457.json b/CVE-2018/CVE-2018-164xx/CVE-2018-16457.json index 7d4e97da3ad..5f5372a6377 100644 --- a/CVE-2018/CVE-2018-164xx/CVE-2018-16457.json +++ b/CVE-2018/CVE-2018-164xx/CVE-2018-16457.json @@ -2,7 +2,7 @@ "id": "CVE-2018-16457", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-04T21:29:01.233", - "lastModified": "2018-11-29T19:59:39.000", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-184xx/CVE-2018-18471.json b/CVE-2018/CVE-2018-184xx/CVE-2018-18471.json index 265e7a0b860..3c28c6d19f4 100644 --- a/CVE-2018/CVE-2018-184xx/CVE-2018-18471.json +++ b/CVE-2018/CVE-2018-184xx/CVE-2018-18471.json @@ -2,7 +2,7 @@ "id": "CVE-2018-18471", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-19T16:15:10.640", - "lastModified": "2019-06-24T12:02:54.783", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -119,7 +119,8 @@ "url": "http://www.axentra.com/en/", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2018/CVE-2018-186xx/CVE-2018-18626.json b/CVE-2018/CVE-2018-186xx/CVE-2018-18626.json index f5c9127a2d2..4c0d4728d16 100644 --- a/CVE-2018/CVE-2018-186xx/CVE-2018-18626.json +++ b/CVE-2018/CVE-2018-186xx/CVE-2018-18626.json @@ -2,7 +2,7 @@ "id": "CVE-2018-18626", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-23T19:29:00.230", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-187xx/CVE-2018-18713.json b/CVE-2018/CVE-2018-187xx/CVE-2018-18713.json index 9052ef137c7..6cdbf4b7138 100644 --- a/CVE-2018/CVE-2018-187xx/CVE-2018-18713.json +++ b/CVE-2018/CVE-2018-187xx/CVE-2018-18713.json @@ -2,7 +2,7 @@ "id": "CVE-2018-18713", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-29T12:29:06.150", - "lastModified": "2019-01-28T13:27:31.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-204xx/CVE-2018-20476.json b/CVE-2018/CVE-2018-204xx/CVE-2018-20476.json index 1c65438c37a..a1708e3ab12 100644 --- a/CVE-2018/CVE-2018-204xx/CVE-2018-20476.json +++ b/CVE-2018/CVE-2018-204xx/CVE-2018-20476.json @@ -2,7 +2,7 @@ "id": "CVE-2018-20476", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-26T03:29:00.317", - "lastModified": "2018-12-30T02:53:00.863", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-204xx/CVE-2018-20477.json b/CVE-2018/CVE-2018-204xx/CVE-2018-20477.json index 4b74dc6a54c..52fa4d0d476 100644 --- a/CVE-2018/CVE-2018-204xx/CVE-2018-20477.json +++ b/CVE-2018/CVE-2018-204xx/CVE-2018-20477.json @@ -2,7 +2,7 @@ "id": "CVE-2018-20477", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-26T03:29:00.367", - "lastModified": "2018-12-30T02:54:00.303", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-53xx/CVE-2018-5371.json b/CVE-2018/CVE-2018-53xx/CVE-2018-5371.json index c6b507f021c..bae093552fe 100644 --- a/CVE-2018/CVE-2018-53xx/CVE-2018-5371.json +++ b/CVE-2018/CVE-2018-53xx/CVE-2018-5371.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5371", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-12T09:29:01.853", - "lastModified": "2018-02-02T18:23:41.703", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,8 +96,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:d-link:dsl-2540u:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D5D4E65F-FBFC-4396-A327-656CACD7676C" + "criteria": "cpe:2.3:h:dlink:dsl-2540u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1955399-CD8D-4FF7-8F70-648323117693" } ] } @@ -128,8 +128,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:d-link:dsl-2640u:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F6FFEDE2-9A4B-48E1-BCCD-02869D4F9057" + "criteria": "cpe:2.3:h:dlink:dsl-2640u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09E483F8-5B0E-498A-B1CA-8F1EA5FD350C" } ] } @@ -143,7 +143,8 @@ "tags": [ "Exploit", "Technical Description", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-74xx/CVE-2018-7467.json b/CVE-2018/CVE-2018-74xx/CVE-2018-7467.json index 760be659783..ab79f7e620d 100644 --- a/CVE-2018/CVE-2018-74xx/CVE-2018-7467.json +++ b/CVE-2018/CVE-2018-74xx/CVE-2018-7467.json @@ -2,7 +2,7 @@ "id": "CVE-2018-7467", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-27T21:29:00.313", - "lastModified": "2018-03-23T14:03:02.203", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.projectxit.com.au/blog/2018/2/27/axxonsoft-client-directory-traversal-cve-2018-7467-axxonsoft-axxon-next-axxonsoft-client-directory-traversal-via-an-initial-css2f-substring-in-a-uri-cve-2018-7467", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2018/CVE-2018-74xx/CVE-2018-7476.json b/CVE-2018/CVE-2018-74xx/CVE-2018-7476.json index a3d22d7e9d0..98ab237fd68 100644 --- a/CVE-2018/CVE-2018-74xx/CVE-2018-7476.json +++ b/CVE-2018/CVE-2018-74xx/CVE-2018-7476.json @@ -2,7 +2,7 @@ "id": "CVE-2018-7476", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-25T19:29:00.267", - "lastModified": "2018-03-16T18:28:34.480", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "url": "https://www.from0to1.me/index.php/archives/22/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-113xx/CVE-2019-11360.json b/CVE-2019/CVE-2019-113xx/CVE-2019-11360.json index f2535e0b104..ae398b70954 100644 --- a/CVE-2019/CVE-2019-113xx/CVE-2019-11360.json +++ b/CVE-2019/CVE-2019-113xx/CVE-2019-11360.json @@ -2,7 +2,7 @@ "id": "CVE-2019-11360", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-12T14:15:11.733", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-113xx/CVE-2019-11397.json b/CVE-2019/CVE-2019-113xx/CVE-2019-11397.json index b44eb31b5ac..8abc6d8fd66 100644 --- a/CVE-2019/CVE-2019-113xx/CVE-2019-11397.json +++ b/CVE-2019/CVE-2019-113xx/CVE-2019-11397.json @@ -2,7 +2,7 @@ "id": "CVE-2019-11397", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-14T21:29:01.230", - "lastModified": "2023-11-07T03:03:00.717", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -113,7 +113,8 @@ "source": "cve@mitre.org", "tags": [ "Product", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2019/CVE-2019-121xx/CVE-2019-12169.json b/CVE-2019/CVE-2019-121xx/CVE-2019-12169.json index 77f4db846de..064cd47886a 100644 --- a/CVE-2019/CVE-2019-121xx/CVE-2019-12169.json +++ b/CVE-2019/CVE-2019-121xx/CVE-2019-12169.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12169", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-03T20:29:00.703", - "lastModified": "2022-04-22T20:11:07.703", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -100,7 +100,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2019/CVE-2019-121xx/CVE-2019-12170.json b/CVE-2019/CVE-2019-121xx/CVE-2019-12170.json index 5302eae610e..aa48f0d270f 100644 --- a/CVE-2019/CVE-2019-121xx/CVE-2019-12170.json +++ b/CVE-2019/CVE-2019-121xx/CVE-2019-12170.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12170", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-17T22:29:00.453", - "lastModified": "2019-08-05T23:15:18.120", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2019/CVE-2019-121xx/CVE-2019-12185.json b/CVE-2019/CVE-2019-121xx/CVE-2019-12185.json index cd77340f7b1..5c4cf3dd366 100644 --- a/CVE-2019/CVE-2019-121xx/CVE-2019-12185.json +++ b/CVE-2019/CVE-2019-121xx/CVE-2019-12185.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12185", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-20T00:29:00.397", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2019/CVE-2019-142xx/CVE-2019-14276.json b/CVE-2019/CVE-2019-142xx/CVE-2019-14276.json index 8743b6ace3d..7e9828fe83a 100644 --- a/CVE-2019/CVE-2019-142xx/CVE-2019-14276.json +++ b/CVE-2019/CVE-2019-142xx/CVE-2019-14276.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14276", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-23T12:15:10.857", - "lastModified": "2019-10-30T17:11:19.680", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.senseofsecurity.com.au/research/it-security-advisories.php", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { @@ -113,7 +114,8 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-142xx/CVE-2019-14277.json b/CVE-2019/CVE-2019-142xx/CVE-2019-14277.json index 3196a8cb7f1..1112b678f14 100644 --- a/CVE-2019/CVE-2019-142xx/CVE-2019-14277.json +++ b/CVE-2019/CVE-2019-142xx/CVE-2019-14277.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14277", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-26T04:15:11.683", - "lastModified": "2023-11-07T03:04:52.520", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -149,7 +149,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-149xx/CVE-2019-14936.json b/CVE-2019/CVE-2019-149xx/CVE-2019-14936.json index 675cb4ceba1..080ff7639ca 100644 --- a/CVE-2019/CVE-2019-149xx/CVE-2019-14936.json +++ b/CVE-2019/CVE-2019-149xx/CVE-2019-14936.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14936", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-11T19:15:11.673", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-158xx/CVE-2019-15811.json b/CVE-2019/CVE-2019-158xx/CVE-2019-15811.json index 3677e707a93..72d43fccd85 100644 --- a/CVE-2019/CVE-2019-158xx/CVE-2019-15811.json +++ b/CVE-2019/CVE-2019-158xx/CVE-2019-15811.json @@ -2,7 +2,7 @@ "id": "CVE-2019-15811", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-29T19:15:13.913", - "lastModified": "2019-09-03T13:10:12.257", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -114,7 +114,8 @@ "url": "https://zerodays.lol/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-161xx/CVE-2019-16123.json b/CVE-2019/CVE-2019-161xx/CVE-2019-16123.json index 2b9cb4dd5d8..cccc308f9cb 100644 --- a/CVE-2019/CVE-2019-161xx/CVE-2019-16123.json +++ b/CVE-2019/CVE-2019-161xx/CVE-2019-16123.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16123", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-09T02:15:10.267", - "lastModified": "2019-09-09T18:35:19.800", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "url": "https://zerodays.lol/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-161xx/CVE-2019-16124.json b/CVE-2019/CVE-2019-161xx/CVE-2019-16124.json index 0a2d5212108..183ec349d4a 100644 --- a/CVE-2019/CVE-2019-161xx/CVE-2019-16124.json +++ b/CVE-2019/CVE-2019-161xx/CVE-2019-16124.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16124", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-09T02:15:10.360", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -115,7 +115,8 @@ "url": "https://zerodays.lol/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-161xx/CVE-2019-16125.json b/CVE-2019/CVE-2019-161xx/CVE-2019-16125.json index bdf275a822b..6466723c306 100644 --- a/CVE-2019/CVE-2019-161xx/CVE-2019-16125.json +++ b/CVE-2019/CVE-2019-161xx/CVE-2019-16125.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16125", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-09T02:15:10.407", - "lastModified": "2019-09-09T19:59:06.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,8 @@ "url": "https://zerodays.lol/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-188xx/CVE-2019-18842.json b/CVE-2019/CVE-2019-188xx/CVE-2019-18842.json index d966cc7dd9e..e249526d311 100644 --- a/CVE-2019/CVE-2019-188xx/CVE-2019-18842.json +++ b/CVE-2019/CVE-2019-188xx/CVE-2019-18842.json @@ -2,7 +2,7 @@ "id": "CVE-2019-18842", "sourceIdentifier": "cve@mitre.org", "published": "2020-01-06T21:15:11.567", - "lastModified": "2020-01-15T14:34:50.250", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -191,7 +191,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-193xx/CVE-2019-19362.json b/CVE-2019/CVE-2019-193xx/CVE-2019-19362.json index d592ed64d10..3c82160a8bb 100644 --- a/CVE-2019/CVE-2019-193xx/CVE-2019-19362.json +++ b/CVE-2019/CVE-2019-193xx/CVE-2019-19362.json @@ -2,7 +2,7 @@ "id": "CVE-2019-19362", "sourceIdentifier": "cve@mitre.org", "published": "2019-12-02T03:15:11.347", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -132,7 +132,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-204xx/CVE-2019-20455.json b/CVE-2019/CVE-2019-204xx/CVE-2019-20455.json index 4a5e8b4fd75..d572d8eb575 100644 --- a/CVE-2019/CVE-2019-204xx/CVE-2019-20455.json +++ b/CVE-2019/CVE-2019-204xx/CVE-2019-20455.json @@ -2,7 +2,7 @@ "id": "CVE-2019-20455", "sourceIdentifier": "cve@mitre.org", "published": "2020-02-14T16:15:09.680", - "lastModified": "2021-11-30T19:42:50.037", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -125,7 +125,8 @@ "tags": [ "Exploit", "Patch", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-92xx/CVE-2019-9201.json b/CVE-2019/CVE-2019-92xx/CVE-2019-9201.json index 1aec260f0ca..06465d8053c 100644 --- a/CVE-2019/CVE-2019-92xx/CVE-2019-9201.json +++ b/CVE-2019/CVE-2019-92xx/CVE-2019-9201.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9201", "sourceIdentifier": "cve@mitre.org", "published": "2019-02-26T23:29:00.357", - "lastModified": "2023-11-07T03:13:37.057", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T16:59:56.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,7 +17,27 @@ "metrics": { "cvssMetricV31": [ { - "source": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "cve@mitre.org", "type": "Secondary", "cvssData": { "version": "3.1", @@ -296,11 +316,17 @@ "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2019-015/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://medium.com/%40SergiuSechel/misconfiguration-in-ilc-gsm-gprs-devices-leaves-over-1-200-ics-devices-vulnerable-to-attacks-over-82c2d4a91561", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-99xx/CVE-2019-9957.json b/CVE-2019/CVE-2019-99xx/CVE-2019-9957.json index 7f03880f033..7bea5bd36d6 100644 --- a/CVE-2019/CVE-2019-99xx/CVE-2019-9957.json +++ b/CVE-2019/CVE-2019-99xx/CVE-2019-9957.json @@ -2,7 +2,7 @@ "id": "CVE-2019-9957", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-24T19:15:10.817", - "lastModified": "2019-06-27T16:06:36.990", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2019/CVE-2019-99xx/CVE-2019-9958.json b/CVE-2019/CVE-2019-99xx/CVE-2019-9958.json index 9c02960afb7..c9e14fae80c 100644 --- a/CVE-2019/CVE-2019-99xx/CVE-2019-9958.json +++ b/CVE-2019/CVE-2019-99xx/CVE-2019-9958.json @@ -2,7 +2,7 @@ "id": "CVE-2019-9958", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-24T19:15:10.867", - "lastModified": "2019-07-03T13:48:38.190", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12635.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12635.json index f309ca5fd92..dcb40532aac 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12635.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12635.json @@ -2,7 +2,7 @@ "id": "CVE-2020-12635", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-29T14:15:12.053", - "lastModified": "2020-07-06T16:39:27.427", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-134xx/CVE-2020-13423.json b/CVE-2020/CVE-2020-134xx/CVE-2020-13423.json index cf4cae67c05..35791692d27 100644 --- a/CVE-2020/CVE-2020-134xx/CVE-2020-13423.json +++ b/CVE-2020/CVE-2020-134xx/CVE-2020-13423.json @@ -2,7 +2,7 @@ "id": "CVE-2020-13423", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-29T14:15:12.147", - "lastModified": "2020-07-02T13:26:16.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "https://anothernetsecblog.com", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { @@ -105,7 +106,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-150xx/CVE-2020-15024.json b/CVE-2020/CVE-2020-150xx/CVE-2020-15024.json index f00768b2881..66e4f21f69a 100644 --- a/CVE-2020/CVE-2020-150xx/CVE-2020-15024.json +++ b/CVE-2020/CVE-2020-150xx/CVE-2020-15024.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15024", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-10T18:15:12.637", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -101,7 +101,8 @@ "url": "http://nestedif.com/avast-antivirus-password-manager-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-150xx/CVE-2020-15046.json b/CVE-2020/CVE-2020-150xx/CVE-2020-15046.json index 4ea8322a9b1..a9db18702dd 100644 --- a/CVE-2020/CVE-2020-150xx/CVE-2020-15046.json +++ b/CVE-2020/CVE-2020-150xx/CVE-2020-15046.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15046", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-24T23:15:10.670", - "lastModified": "2020-07-13T20:12:36.067", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -123,7 +123,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-196xx/CVE-2020-19611.json b/CVE-2020/CVE-2020-196xx/CVE-2020-19611.json index 0f65e1446bf..c40752b3a9c 100644 --- a/CVE-2020/CVE-2020-196xx/CVE-2020-19611.json +++ b/CVE-2020/CVE-2020-196xx/CVE-2020-19611.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19611", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-07T16:15:07.190", - "lastModified": "2021-12-07T18:27:53.037", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://racktables.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-202xx/CVE-2020-20287.json b/CVE-2020/CVE-2020-202xx/CVE-2020-20287.json index ea29c6b58c8..f00863c3deb 100644 --- a/CVE-2020/CVE-2020-202xx/CVE-2020-20287.json +++ b/CVE-2020/CVE-2020-202xx/CVE-2020-20287.json @@ -2,7 +2,7 @@ "id": "CVE-2020-20287", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-01T18:15:12.857", - "lastModified": "2021-02-04T16:07:36.817", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://www.yccms.net/", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-202xx/CVE-2020-20289.json b/CVE-2020/CVE-2020-202xx/CVE-2020-20289.json index c72b3acc105..c4b3c90342f 100644 --- a/CVE-2020/CVE-2020-202xx/CVE-2020-20289.json +++ b/CVE-2020/CVE-2020-202xx/CVE-2020-20289.json @@ -2,7 +2,7 @@ "id": "CVE-2020-20289", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-01T18:15:12.937", - "lastModified": "2021-02-03T21:48:13.930", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Product", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-205xx/CVE-2020-20584.json b/CVE-2020/CVE-2020-205xx/CVE-2020-20584.json index 9768b3ba475..bc12d733480 100644 --- a/CVE-2020/CVE-2020-205xx/CVE-2020-20584.json +++ b/CVE-2020/CVE-2020-205xx/CVE-2020-20584.json @@ -2,7 +2,7 @@ "id": "CVE-2020-20584", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-08T16:15:08.240", - "lastModified": "2021-07-12T12:59:00.793", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://baigosso.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-217xx/CVE-2020-21732.json b/CVE-2020/CVE-2020-217xx/CVE-2020-21732.json index 025012fecc6..ee04f47c729 100644 --- a/CVE-2020/CVE-2020-217xx/CVE-2020-21732.json +++ b/CVE-2020/CVE-2020-217xx/CVE-2020-21732.json @@ -2,7 +2,7 @@ "id": "CVE-2020-21732", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T12:15:10.883", - "lastModified": "2020-09-17T21:01:43.547", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://rukovoditel.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-223xx/CVE-2020-22390.json b/CVE-2020/CVE-2020-223xx/CVE-2020-22390.json index 9dee0c278c4..e63cec5ff41 100644 --- a/CVE-2020/CVE-2020-223xx/CVE-2020-22390.json +++ b/CVE-2020/CVE-2020-223xx/CVE-2020-22390.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22390", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-21T15:15:08.027", - "lastModified": "2021-06-25T00:41:16.013", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-225xx/CVE-2020-22552.json b/CVE-2020/CVE-2020-225xx/CVE-2020-22552.json index c90e308e040..598dde6fdcb 100644 --- a/CVE-2020/CVE-2020-225xx/CVE-2020-22552.json +++ b/CVE-2020/CVE-2020-225xx/CVE-2020-22552.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22552", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-28T14:15:12.253", - "lastModified": "2020-11-03T14:13:19.890", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://snap7.com", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-227xx/CVE-2020-22761.json b/CVE-2020/CVE-2020-227xx/CVE-2020-22761.json index fc1c4011f99..eeff65a93cf 100644 --- a/CVE-2020/CVE-2020-227xx/CVE-2020-22761.json +++ b/CVE-2020/CVE-2020-227xx/CVE-2020-22761.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22761", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-30T14:15:13.757", - "lastModified": "2021-08-03T23:43:37.910", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -108,7 +108,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json index f0af9ba7d6d..7c2687fbbff 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24312.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24312", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T13:15:10.860", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24313.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24313.json index 350b7c4de9c..076d1513689 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24313.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24313.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24313", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T13:15:10.907", - "lastModified": "2020-09-03T18:40:11.733", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24314.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24314.json index e5225491619..8cf12cb7485 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24314.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24314.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24314", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T13:15:10.987", - "lastModified": "2020-09-03T19:03:38.760", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24315.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24315.json index cb3956148e9..319eb52c264 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24315.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24315.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24315", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T14:15:10.807", - "lastModified": "2020-09-01T16:23:34.603", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-243xx/CVE-2020-24316.json b/CVE-2020/CVE-2020-243xx/CVE-2020-24316.json index d30d66297ea..a2e953dcc4d 100644 --- a/CVE-2020/CVE-2020-243xx/CVE-2020-24316.json +++ b/CVE-2020/CVE-2020-243xx/CVE-2020-24316.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24316", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T14:15:10.853", - "lastModified": "2020-10-20T16:55:38.633", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -107,7 +107,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-250xx/CVE-2020-25033.json b/CVE-2020/CVE-2020-250xx/CVE-2020-25033.json index 8ee74dbd93c..da1db24f793 100644 --- a/CVE-2020/CVE-2020-250xx/CVE-2020-25033.json +++ b/CVE-2020/CVE-2020-250xx/CVE-2020-25033.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25033", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-31T05:15:11.340", - "lastModified": "2020-09-04T16:28:47.227", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -104,7 +104,8 @@ "url": "https://zeroaptitude.com/pitticus/subscribe-sidebar-plugin-by-blubrry-v1-3-1-reflected-xss-20-jun-2020/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-253xx/CVE-2020-25375.json b/CVE-2020/CVE-2020-253xx/CVE-2020-25375.json index 7e665f566ec..ec8f24ad84b 100644 --- a/CVE-2020/CVE-2020-253xx/CVE-2020-25375.json +++ b/CVE-2020/CVE-2020-253xx/CVE-2020-25375.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25375", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T16:15:11.637", - "lastModified": "2020-09-18T18:10:31.373", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-253xx/CVE-2020-25378.json b/CVE-2020/CVE-2020-253xx/CVE-2020-25378.json index e5cd134bade..05808b3d74d 100644 --- a/CVE-2020/CVE-2020-253xx/CVE-2020-25378.json +++ b/CVE-2020/CVE-2020-253xx/CVE-2020-25378.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25378", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T16:15:11.700", - "lastModified": "2020-09-17T20:41:52.403", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-253xx/CVE-2020-25379.json b/CVE-2020/CVE-2020-253xx/CVE-2020-25379.json index e6e4a23148d..5ba58213bac 100644 --- a/CVE-2020/CVE-2020-253xx/CVE-2020-25379.json +++ b/CVE-2020/CVE-2020-253xx/CVE-2020-25379.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25379", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T16:15:11.747", - "lastModified": "2020-09-18T19:20:59.073", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-253xx/CVE-2020-25380.json b/CVE-2020/CVE-2020-253xx/CVE-2020-25380.json index 9f930ceffed..979fbc82989 100644 --- a/CVE-2020/CVE-2020-253xx/CVE-2020-25380.json +++ b/CVE-2020/CVE-2020-253xx/CVE-2020-25380.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25380", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-14T16:15:11.810", - "lastModified": "2020-09-18T19:16:03.280", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-265xx/CVE-2020-26522.json b/CVE-2020/CVE-2020-265xx/CVE-2020-26522.json index 872420b6fe9..1265dc2d01a 100644 --- a/CVE-2020/CVE-2020-265xx/CVE-2020-26522.json +++ b/CVE-2020/CVE-2020-265xx/CVE-2020-26522.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26522", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-09T07:15:11.963", - "lastModified": "2020-10-16T20:01:57.120", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,7 +106,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-268xx/CVE-2020-26801.json b/CVE-2020/CVE-2020-268xx/CVE-2020-26801.json index a55f19201d9..0ddf132f146 100644 --- a/CVE-2020/CVE-2020-268xx/CVE-2020-26801.json +++ b/CVE-2020/CVE-2020-268xx/CVE-2020-26801.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26801", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-25T13:15:08.147", - "lastModified": "2021-07-01T18:17:55.643", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -109,7 +109,8 @@ "url": "http://su2200rtxl2ua.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2020/CVE-2020-291xx/CVE-2020-29146.json b/CVE-2020/CVE-2020-291xx/CVE-2020-29146.json index 73f0a02b5e3..d8b4705ad16 100644 --- a/CVE-2020/CVE-2020-291xx/CVE-2020-29146.json +++ b/CVE-2020/CVE-2020-291xx/CVE-2020-29146.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29146", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-14T17:15:07.747", - "lastModified": "2021-07-16T16:15:55.397", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-291xx/CVE-2020-29147.json b/CVE-2020/CVE-2020-291xx/CVE-2020-29147.json index 8915a0b64c8..c384d6034e3 100644 --- a/CVE-2020/CVE-2020-291xx/CVE-2020-29147.json +++ b/CVE-2020/CVE-2020-291xx/CVE-2020-29147.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29147", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-14T17:15:07.773", - "lastModified": "2021-07-16T20:08:09.930", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-352xx/CVE-2020-35296.json b/CVE-2020/CVE-2020-352xx/CVE-2020-35296.json index 325eacecf08..bce69103b5e 100644 --- a/CVE-2020/CVE-2020-352xx/CVE-2020-35296.json +++ b/CVE-2020/CVE-2020-352xx/CVE-2020-35296.json @@ -2,7 +2,7 @@ "id": "CVE-2020-35296", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-03T16:15:12.617", - "lastModified": "2023-12-07T14:22:18.950", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -113,7 +113,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-353xx/CVE-2020-35373.json b/CVE-2020/CVE-2020-353xx/CVE-2020-35373.json index 8c17869e658..c041fb2242a 100644 --- a/CVE-2020/CVE-2020-353xx/CVE-2020-35373.json +++ b/CVE-2020/CVE-2020-353xx/CVE-2020-35373.json @@ -2,7 +2,7 @@ "id": "CVE-2020-35373", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-17T16:15:07.673", - "lastModified": "2021-06-22T15:11:10.170", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36139.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36139.json index 128817573ce..0fc15d85f12 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36139.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36139.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36139", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-04T16:15:08.123", - "lastModified": "2021-06-08T21:38:41.427", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "tags": [ "Exploit", "Issue Tracking", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36140.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36140.json index 7f358831a97..6e011c8d4f6 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36140.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36140.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36140", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-04T16:15:08.150", - "lastModified": "2021-06-09T15:58:39.800", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36141.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36141.json index 67a3afd9e8a..d69c6102d53 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36141.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36141.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36141", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-04T16:15:08.177", - "lastModified": "2021-06-09T16:14:44.887", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-361xx/CVE-2020-36142.json b/CVE-2020/CVE-2020-361xx/CVE-2020-36142.json index cc75827947b..fbe06120866 100644 --- a/CVE-2020/CVE-2020-361xx/CVE-2020-36142.json +++ b/CVE-2020/CVE-2020-361xx/CVE-2020-36142.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36142", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-04T16:15:08.203", - "lastModified": "2021-06-09T16:15:16.047", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2020/CVE-2020-72xx/CVE-2020-7229.json b/CVE-2020/CVE-2020-72xx/CVE-2020-7229.json index 04c28350313..d62789a7a91 100644 --- a/CVE-2020/CVE-2020-72xx/CVE-2020-7229.json +++ b/CVE-2020/CVE-2020-72xx/CVE-2020-7229.json @@ -2,7 +2,7 @@ "id": "CVE-2020-7229", "sourceIdentifier": "cve@mitre.org", "published": "2020-01-21T17:15:12.863", - "lastModified": "2020-01-29T16:54:08.147", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "url": "https://simplejobscript.com", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2021/CVE-2021-234xx/CVE-2021-23452.json b/CVE-2021/CVE-2021-234xx/CVE-2021-23452.json index f268f0f9f6b..b680aecb659 100644 --- a/CVE-2021/CVE-2021-234xx/CVE-2021-23452.json +++ b/CVE-2021/CVE-2021-234xx/CVE-2021-23452.json @@ -2,7 +2,7 @@ "id": "CVE-2021-23452", "sourceIdentifier": "report@snyk.io", "published": "2021-10-20T13:15:07.537", - "lastModified": "2022-12-02T19:34:19.847", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -117,7 +117,8 @@ "url": "https://runkit.com/embed/sq8qjwemyn8t", "source": "report@snyk.io", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-258xx/CVE-2021-25874.json b/CVE-2021/CVE-2021-258xx/CVE-2021-25874.json index 51ebcd5ac07..db4d51b98f6 100644 --- a/CVE-2021/CVE-2021-258xx/CVE-2021-25874.json +++ b/CVE-2021/CVE-2021-258xx/CVE-2021-25874.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25874", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T12:15:07.970", - "lastModified": "2021-11-08T16:42:05.950", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-258xx/CVE-2021-25875.json b/CVE-2021/CVE-2021-258xx/CVE-2021-25875.json index f1ee253c012..7a9909a6c51 100644 --- a/CVE-2021/CVE-2021-258xx/CVE-2021-25875.json +++ b/CVE-2021/CVE-2021-258xx/CVE-2021-25875.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25875", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T12:15:08.020", - "lastModified": "2021-11-08T16:32:27.973", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-258xx/CVE-2021-25876.json b/CVE-2021/CVE-2021-258xx/CVE-2021-25876.json index d57751a995c..8107630567e 100644 --- a/CVE-2021/CVE-2021-258xx/CVE-2021-25876.json +++ b/CVE-2021/CVE-2021-258xx/CVE-2021-25876.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25876", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T12:15:08.060", - "lastModified": "2021-11-08T16:26:11.987", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-258xx/CVE-2021-25877.json b/CVE-2021/CVE-2021-258xx/CVE-2021-25877.json index f571d7ce470..58a83e0a38c 100644 --- a/CVE-2021/CVE-2021-258xx/CVE-2021-25877.json +++ b/CVE-2021/CVE-2021-258xx/CVE-2021-25877.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25877", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T12:15:08.100", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-258xx/CVE-2021-25878.json b/CVE-2021/CVE-2021-258xx/CVE-2021-25878.json index 4c59c742009..a3e13c39307 100644 --- a/CVE-2021/CVE-2021-258xx/CVE-2021-25878.json +++ b/CVE-2021/CVE-2021-258xx/CVE-2021-25878.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25878", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T12:15:08.143", - "lastModified": "2021-11-08T15:55:32.193", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -99,7 +99,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-288xx/CVE-2021-28860.json b/CVE-2021/CVE-2021-288xx/CVE-2021-28860.json index 3d600a87091..ee13df48a44 100644 --- a/CVE-2021/CVE-2021-288xx/CVE-2021-28860.json +++ b/CVE-2021/CVE-2021-288xx/CVE-2021-28860.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28860", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-03T12:15:07.467", - "lastModified": "2021-12-10T18:55:23.907", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "url": "http://nodejs.com", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-299xx/CVE-2021-29939.json b/CVE-2021/CVE-2021-299xx/CVE-2021-29939.json index 0446963f69c..c92d74e1f80 100644 --- a/CVE-2021/CVE-2021-299xx/CVE-2021-29939.json +++ b/CVE-2021/CVE-2021-299xx/CVE-2021-29939.json @@ -2,7 +2,7 @@ "id": "CVE-2021-29939", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-01T05:15:14.843", - "lastModified": "2021-04-06T14:23:40.597", + "lastModified": "2024-02-14T16:31:00.953", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:stackvector_project:stackvector:*:*:*:*:*:rust:*:*", - "versionEndIncluding": "2021-02-19", - "matchCriteriaId": "1DC0D703-FECC-4D07-803A-A9C0EED00B0D" + "versionEndExcluding": "1.0.9", + "matchCriteriaId": "286FC175-419A-4C72-9852-7D1497109C94" } ] } diff --git a/CVE-2021/CVE-2021-332xx/CVE-2021-33259.json b/CVE-2021/CVE-2021-332xx/CVE-2021-33259.json index dccf586e343..3862d95c44e 100644 --- a/CVE-2021/CVE-2021-332xx/CVE-2021-33259.json +++ b/CVE-2021/CVE-2021-332xx/CVE-2021-33259.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33259", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-31T19:15:09.920", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,8 +96,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:d-link:dir-868lw:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C388E13F-51BA-4D94-84E5-D906BE8D8932" + "criteria": "cpe:2.3:h:dlink:dir-868lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43B5B770-C4F2-4663-814D-C85CDE086192" } ] } @@ -116,7 +116,8 @@ "url": "http://dir-868lw.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-335xx/CVE-2021-33570.json b/CVE-2021/CVE-2021-335xx/CVE-2021-33570.json index e5a7115e1a0..1689db1809f 100644 --- a/CVE-2021/CVE-2021-335xx/CVE-2021-33570.json +++ b/CVE-2021/CVE-2021-335xx/CVE-2021-33570.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33570", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-25T22:15:10.353", - "lastModified": "2022-06-03T18:54:45.940", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -147,7 +147,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-341xx/CVE-2021-34110.json b/CVE-2021/CVE-2021-341xx/CVE-2021-34110.json index f9ee9407044..1f1b9ebb703 100644 --- a/CVE-2021/CVE-2021-341xx/CVE-2021-34110.json +++ b/CVE-2021/CVE-2021-341xx/CVE-2021-34110.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34110", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-08T13:15:07.870", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -104,7 +104,8 @@ "url": "http://winwastenet.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-342xx/CVE-2021-34201.json b/CVE-2021/CVE-2021-342xx/CVE-2021-34201.json index 0a08213498e..a7ca577a636 100644 --- a/CVE-2021/CVE-2021-342xx/CVE-2021-34201.json +++ b/CVE-2021/CVE-2021-342xx/CVE-2021-34201.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34201", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-16T20:15:07.573", - "lastModified": "2021-06-24T15:39:55.837", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -116,7 +116,8 @@ "url": "http://dir-2640-us.com", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-342xx/CVE-2021-34202.json b/CVE-2021/CVE-2021-342xx/CVE-2021-34202.json index fe615fa7826..e29d8ff4f7b 100644 --- a/CVE-2021/CVE-2021-342xx/CVE-2021-34202.json +++ b/CVE-2021/CVE-2021-342xx/CVE-2021-34202.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34202", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-16T19:15:39.263", - "lastModified": "2021-06-23T23:10:35.917", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -116,7 +116,8 @@ "url": "http://dir-2640-us.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-342xx/CVE-2021-34203.json b/CVE-2021/CVE-2021-342xx/CVE-2021-34203.json index 0ff68ae3b3d..42e75d64f6f 100644 --- a/CVE-2021/CVE-2021-342xx/CVE-2021-34203.json +++ b/CVE-2021/CVE-2021-342xx/CVE-2021-34203.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34203", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-16T20:15:07.610", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -116,7 +116,8 @@ "url": "http://dir-2640-us.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-342xx/CVE-2021-34204.json b/CVE-2021/CVE-2021-342xx/CVE-2021-34204.json index ee2d3a48f57..a5bd778e00f 100644 --- a/CVE-2021/CVE-2021-342xx/CVE-2021-34204.json +++ b/CVE-2021/CVE-2021-342xx/CVE-2021-34204.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34204", "sourceIdentifier": "cve@mitre.org", "published": "2021-06-16T20:15:07.647", - "lastModified": "2021-06-28T14:08:00.753", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -116,7 +116,8 @@ "url": "http://dir-2640-us.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36460.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36460.json index fd7c0bb09cb..563f56a3880 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36460.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36460.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36460", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-25T13:15:49.330", - "lastModified": "2022-05-05T13:46:55.707", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-312" + "value": "CWE-287" } ] } @@ -105,7 +105,8 @@ "source": "cve@mitre.org", "tags": [ "Not Applicable", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-375xx/CVE-2021-37504.json b/CVE-2021/CVE-2021-375xx/CVE-2021-37504.json index 6453dd90d09..93092dd0ffd 100644 --- a/CVE-2021/CVE-2021-375xx/CVE-2021-37504.json +++ b/CVE-2021/CVE-2021-375xx/CVE-2021-37504.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37504", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-25T19:15:12.030", - "lastModified": "2022-03-08T14:06:13.093", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -125,7 +125,8 @@ "url": "http://jquery-upload-file.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-383xx/CVE-2021-38306.json b/CVE-2021/CVE-2021-383xx/CVE-2021-38306.json index 7c84b4b0b97..bde7567f5a6 100644 --- a/CVE-2021/CVE-2021-383xx/CVE-2021-38306.json +++ b/CVE-2021/CVE-2021-383xx/CVE-2021-38306.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38306", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-24T13:15:14.383", - "lastModified": "2021-09-09T18:58:38.650", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -131,7 +131,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2021/CVE-2021-385xx/CVE-2021-38556.json b/CVE-2021/CVE-2021-385xx/CVE-2021-38556.json index 94c26207abf..7fcf79d7ddf 100644 --- a/CVE-2021/CVE-2021-385xx/CVE-2021-38556.json +++ b/CVE-2021/CVE-2021-385xx/CVE-2021-38556.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38556", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-24T13:15:14.467", - "lastModified": "2021-09-02T16:54:28.360", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -113,7 +113,8 @@ "tags": [ "Exploit", "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "URL Repurposed" ] } ] diff --git a/CVE-2021/CVE-2021-385xx/CVE-2021-38557.json b/CVE-2021/CVE-2021-385xx/CVE-2021-38557.json index 6111f4259ac..227b139178b 100644 --- a/CVE-2021/CVE-2021-385xx/CVE-2021-38557.json +++ b/CVE-2021/CVE-2021-385xx/CVE-2021-38557.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38557", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-24T13:15:14.513", - "lastModified": "2021-09-02T16:26:39.577", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -112,7 +112,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38694.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38694.json index 108fed3c4cc..ad1dc45de3c 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38694.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38694.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38694", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-18T14:15:08.057", - "lastModified": "2022-06-03T14:03:59.440", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38695.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38695.json index d5f5b2f8cf2..bde5f7d7e88 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38695.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38695.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38695", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-18T15:15:08.037", - "lastModified": "2022-06-03T14:04:06.163", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38696.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38696.json index 94db41acd2e..ad6ab0323c1 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38696.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38696.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38696", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-18T15:15:08.083", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-386xx/CVE-2021-38697.json b/CVE-2021/CVE-2021-386xx/CVE-2021-38697.json index 209a3145590..941b778ec39 100644 --- a/CVE-2021/CVE-2021-386xx/CVE-2021-38697.json +++ b/CVE-2021/CVE-2021-386xx/CVE-2021-38697.json @@ -2,7 +2,7 @@ "id": "CVE-2021-38697", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-18T15:15:08.127", - "lastModified": "2022-06-01T18:22:46.897", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,7 +105,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41441.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41441.json index c6459030142..8c74b34a2c6 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41441.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41441.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41441", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-09T17:15:08.250", - "lastModified": "2022-02-17T14:59:58.760", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,6 +106,21 @@ } ], "references": [ + { + "url": "http://d-link.com", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://dir-x1860.com", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10283", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41442.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41442.json index 3d3c2c90ada..00bde1920e1 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41442.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41442.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41442", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-09T20:15:12.413", - "lastModified": "2022-02-15T12:49:56.217", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -106,6 +106,21 @@ } ], "references": [ + { + "url": "http://d-link.com", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://dir-x1860.com", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] + }, { "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10283", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41445.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41445.json index cfa7e254f0a..2a03919ead6 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41445.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41445.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41445", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-10T17:15:09.283", - "lastModified": "2022-02-17T15:26:42.717", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -117,7 +117,8 @@ "url": "http://dir-x1860.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41450.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41450.json index 1e07047fcb9..2e35fd1d882 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41450.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41450.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41450", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-08T16:15:07.097", - "lastModified": "2021-12-13T20:25:10.690", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "url": "http://ax10v1.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41451.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41451.json index d64a2861e71..ed9e05074ae 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41451.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41451.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41451", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-17T15:15:07.493", - "lastModified": "2021-12-30T14:22:24.703", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "url": "http://ax10v1.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-428xx/CVE-2021-42868.json b/CVE-2021/CVE-2021-428xx/CVE-2021-42868.json index b87d35a406f..1e1201b29ef 100644 --- a/CVE-2021/CVE-2021-428xx/CVE-2021-42868.json +++ b/CVE-2021/CVE-2021-428xx/CVE-2021-42868.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42868", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-31T18:15:08.723", - "lastModified": "2022-04-07T19:41:52.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://chikista.com", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-428xx/CVE-2021-42872.json b/CVE-2021/CVE-2021-428xx/CVE-2021-42872.json index bbd00c1969d..2375a55171d 100644 --- a/CVE-2021/CVE-2021-428xx/CVE-2021-42872.json +++ b/CVE-2021/CVE-2021-428xx/CVE-2021-42872.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42872", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T14:15:30.877", - "lastModified": "2022-06-09T15:18:41.627", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -109,7 +109,8 @@ "url": "http://ex1200t.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-428xx/CVE-2021-42875.json b/CVE-2021/CVE-2021-428xx/CVE-2021-42875.json index 5a1fc2e4eb0..d1fed87768c 100644 --- a/CVE-2021/CVE-2021-428xx/CVE-2021-42875.json +++ b/CVE-2021/CVE-2021-428xx/CVE-2021-42875.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42875", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T19:15:08.987", - "lastModified": "2022-06-13T16:18:03.477", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-77" + "value": "CWE-78" } ] } @@ -109,7 +109,8 @@ "url": "http://ex1200t.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-428xx/CVE-2021-42877.json b/CVE-2021/CVE-2021-428xx/CVE-2021-42877.json index 8a9ccbdf71b..89ab3e3e486 100644 --- a/CVE-2021/CVE-2021-428xx/CVE-2021-42877.json +++ b/CVE-2021/CVE-2021-428xx/CVE-2021-42877.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42877", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T20:15:08.333", - "lastModified": "2022-06-11T01:50:50.960", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -109,7 +109,8 @@ "url": "http://ex1200t.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-429xx/CVE-2021-42969.json b/CVE-2021/CVE-2021-429xx/CVE-2021-42969.json index c221192688d..151afca82fc 100644 --- a/CVE-2021/CVE-2021-429xx/CVE-2021-42969.json +++ b/CVE-2021/CVE-2021-429xx/CVE-2021-42969.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42969", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-13T12:15:08.207", - "lastModified": "2022-05-23T18:58:06.600", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] } ] diff --git a/CVE-2021/CVE-2021-434xx/CVE-2021-43432.json b/CVE-2021/CVE-2021-434xx/CVE-2021-43432.json index 9446147add6..4aca339c403 100644 --- a/CVE-2021/CVE-2021-434xx/CVE-2021-43432.json +++ b/CVE-2021/CVE-2021-434xx/CVE-2021-43432.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43432", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-07T19:15:07.917", - "lastModified": "2022-04-13T20:23:03.860", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "url": "http://exrick.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-449xx/CVE-2021-44971.json b/CVE-2021/CVE-2021-449xx/CVE-2021-44971.json index 031159195a9..71955dc94c0 100644 --- a/CVE-2021/CVE-2021-449xx/CVE-2021-44971.json +++ b/CVE-2021/CVE-2021-449xx/CVE-2021-44971.json @@ -2,7 +2,7 @@ "id": "CVE-2021-44971", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-28T19:15:07.963", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -136,7 +136,8 @@ "url": "http://ac15v10.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45024.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45024.json index ca97bab1d11..257f6a6db3a 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45024.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45024.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45024", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-17T13:15:12.243", - "lastModified": "2022-06-27T20:06:35.417", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://asg-zena.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45025.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45025.json index 410aee72c32..dd2fde36a2e 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45025.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45025.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45025", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-17T13:15:12.293", - "lastModified": "2022-06-27T20:07:06.533", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://asg-zena.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45026.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45026.json index 18b313db5ed..31adf69ef1f 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45026.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45026.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45026", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-17T13:15:12.343", - "lastModified": "2022-06-27T20:08:09.533", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://asg-zena.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45756.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45756.json index dd8bada5819..d9ed214c849 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45756.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45756.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45756", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-23T11:15:08.087", - "lastModified": "2022-03-29T17:18:21.197", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -145,7 +145,8 @@ "url": "http://rt-ac68u.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45757.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45757.json index b98e7536059..65ce4209f7d 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45757.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45757.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45757", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-23T11:15:08.203", - "lastModified": "2022-03-29T17:21:17.767", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -110,7 +110,8 @@ "url": "http://ac68u.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46064.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46064.json index 90ac4b0fc8f..93e1719619f 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46064.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46064.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46064", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-23T18:15:08.967", - "lastModified": "2022-03-29T00:43:48.727", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://irfan.com", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json index b2afaace916..d0173a94add 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46757.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46757", "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:50.060", - "lastModified": "2024-02-13T20:15:50.060", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-211xx/CVE-2022-21169.json b/CVE-2022/CVE-2022-211xx/CVE-2022-21169.json index 063fc4a24fc..f802a61f94f 100644 --- a/CVE-2022/CVE-2022-211xx/CVE-2022-21169.json +++ b/CVE-2022/CVE-2022-211xx/CVE-2022-21169.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21169", "sourceIdentifier": "report@snyk.io", "published": "2022-09-26T05:15:10.133", - "lastModified": "2022-09-28T17:21:57.197", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -111,7 +111,8 @@ "source": "report@snyk.io", "tags": [ "Patch", - "Third Party Advisory" + "Third Party Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22901.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22901.json index f7fd6776661..71c04bd1e8f 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22901.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22901.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22901", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-17T03:15:06.847", - "lastModified": "2022-02-25T01:01:02.493", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://jerryscript.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-255xx/CVE-2022-25578.json b/CVE-2022/CVE-2022-255xx/CVE-2022-25578.json index 8e36f5e4e3d..45263c1cfe1 100644 --- a/CVE-2022/CVE-2022-255xx/CVE-2022-25578.json +++ b/CVE-2022/CVE-2022-255xx/CVE-2022-25578.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25578", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-18T23:15:07.710", - "lastModified": "2022-03-28T15:12:53.243", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://taocms.com", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28102.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28102.json index 7fb1743a755..40e54c9ad7c 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28102.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28102.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28102", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-28T14:15:07.763", - "lastModified": "2022-05-06T16:49:26.207", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://php-mysql-admin-panel-generator.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-289xx/CVE-2022-28932.json b/CVE-2022/CVE-2022-289xx/CVE-2022-28932.json index bf0411cf47d..706614d843f 100644 --- a/CVE-2022/CVE-2022-289xx/CVE-2022-28932.json +++ b/CVE-2022/CVE-2022-289xx/CVE-2022-28932.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28932", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-23T16:16:07.650", - "lastModified": "2022-06-02T22:57:00.860", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -116,7 +116,8 @@ "url": "http://dsl-g2452dg.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-293xx/CVE-2022-29347.json b/CVE-2022/CVE-2022-293xx/CVE-2022-29347.json index 0ef047feb6a..c18aad18d79 100644 --- a/CVE-2022/CVE-2022-293xx/CVE-2022-29347.json +++ b/CVE-2022/CVE-2022-293xx/CVE-2022-29347.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29347", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-04T15:15:13.133", - "lastModified": "2022-05-12T14:37:41.620", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -104,7 +104,8 @@ "url": "http://zeitpraxcom.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-293xx/CVE-2022-29351.json b/CVE-2022/CVE-2022-293xx/CVE-2022-29351.json index 83091541799..a92a77c8e19 100644 --- a/CVE-2022/CVE-2022-293xx/CVE-2022-29351.json +++ b/CVE-2022/CVE-2022-293xx/CVE-2022-29351.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29351", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-16T14:15:07.900", - "lastModified": "2022-05-24T17:21:59.107", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30024.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30024.json index 621b0afa2ec..e2ff4a586cc 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30024.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30024.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30024", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-14T14:15:13.277", - "lastModified": "2022-07-21T01:41:10.523", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -202,7 +202,8 @@ "url": "http://tl-wr841.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30034.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30034.json index a76b85f33d0..208c3e0263c 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30034.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30034.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30034", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T14:15:51.427", - "lastModified": "2024-02-13T17:21:11.063", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "url": "http://githubcommherflower.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30078.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30078.json index 859f7e58f56..c3f25e4108b 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30078.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30078.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30078", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-07T19:15:08.513", - "lastModified": "2022-09-12T18:36:48.600", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-77" + "value": "CWE-78" } ] } @@ -113,7 +113,8 @@ "url": "http://r6200v2.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30079.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30079.json index 36f5040e3f7..1642c34f843 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30079.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30079.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30079", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-08T12:15:08.617", - "lastModified": "2022-12-09T17:17:13.937", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-77" + "value": "CWE-78" } ] } @@ -91,7 +91,8 @@ "url": "http://r6200v2.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30273.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30273.json index 8f296420c48..f3747e5412a 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30273.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30273.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30273", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-26T22:15:11.227", - "lastModified": "2022-08-02T20:49:56.363", + "lastModified": "2024-02-14T16:10:40.897", "vulnStatus": "Analyzed", "descriptions": [ { @@ -46,6 +46,10 @@ { "lang": "en", "value": "CWE-327" + }, + { + "lang": "en", + "value": "CWE-345" } ] } @@ -98,6 +102,7 @@ "url": "https://www.forescout.com/blog/", "source": "cve@mitre.org", "tags": [ + "Not Applicable", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30275.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30275.json index dd665e527d5..bef7acc82b7 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30275.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30275.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30275", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-26T22:15:11.273", - "lastModified": "2022-08-02T20:49:00.330", + "lastModified": "2024-02-14T15:32:19.563", "vulnStatus": "Analyzed", "descriptions": [ { diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30320.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30320.json index 0d51badb447..599584ebef4 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30320.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30320.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30320", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-28T16:15:11.757", - "lastModified": "2022-08-10T15:50:05.453", + "lastModified": "2024-02-14T16:10:47.343", "vulnStatus": "Analyzed", "descriptions": [ { @@ -80,6 +80,7 @@ "url": "https://www.forescout.com/blog/", "source": "cve@mitre.org", "tags": [ + "Not Applicable", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-319xx/CVE-2022-31904.json b/CVE-2022/CVE-2022-319xx/CVE-2022-31904.json index 6e360e57236..a62bc6f2001 100644 --- a/CVE-2022/CVE-2022-319xx/CVE-2022-31904.json +++ b/CVE-2022/CVE-2022-319xx/CVE-2022-31904.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31904", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-12T14:15:16.880", - "lastModified": "2022-07-19T01:59:35.183", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -98,7 +98,8 @@ "url": "http://egt-kommunikationstechnik.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-330xx/CVE-2022-33047.json b/CVE-2022/CVE-2022-330xx/CVE-2022-33047.json index 3061d8e2b7a..d2333cdf87d 100644 --- a/CVE-2022/CVE-2022-330xx/CVE-2022-33047.json +++ b/CVE-2022/CVE-2022-330xx/CVE-2022-33047.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33047", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-06T19:15:08.590", - "lastModified": "2022-07-14T11:57:46.607", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -97,7 +97,8 @@ "url": "http://otfcc.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34624.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34624.json index a8d23daf226..5b7e610f093 100644 --- a/CVE-2022/CVE-2022-346xx/CVE-2022-34624.json +++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34624.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34624", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-19T14:15:08.423", - "lastModified": "2022-08-23T17:27:41.833", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,14 +77,16 @@ "url": "http://hkotel.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { "url": "http://mealie.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-351xx/CVE-2022-35167.json b/CVE-2022/CVE-2022-351xx/CVE-2022-35167.json index f0520481b20..2673d158064 100644 --- a/CVE-2022/CVE-2022-351xx/CVE-2022-35167.json +++ b/CVE-2022/CVE-2022-351xx/CVE-2022-35167.json @@ -2,7 +2,7 @@ "id": "CVE-2022-35167", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-19T02:15:07.200", - "lastModified": "2023-01-23T13:57:02.373", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-732" } ] } @@ -79,7 +79,8 @@ "url": "http://printixnet.com", "source": "cve@mitre.org", "tags": [ - "Permissions Required" + "Permissions Required", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-352xx/CVE-2022-35201.json b/CVE-2022/CVE-2022-352xx/CVE-2022-35201.json index 076fea1592c..9cd8fd288ea 100644 --- a/CVE-2022/CVE-2022-352xx/CVE-2022-35201.json +++ b/CVE-2022/CVE-2022-352xx/CVE-2022-35201.json @@ -2,7 +2,7 @@ "id": "CVE-2022-35201", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-19T15:15:08.417", - "lastModified": "2022-08-23T16:38:17.577", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -91,7 +91,8 @@ "url": "http://tenda-ac18.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-352xx/CVE-2022-35203.json b/CVE-2022/CVE-2022-352xx/CVE-2022-35203.json index 6d0169ade6d..fdf15f84921 100644 --- a/CVE-2022/CVE-2022-352xx/CVE-2022-35203.json +++ b/CVE-2022/CVE-2022-352xx/CVE-2022-35203.json @@ -2,7 +2,7 @@ "id": "CVE-2022-35203", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-23T13:15:08.427", - "lastModified": "2023-11-07T03:48:49.693", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -91,7 +91,8 @@ "url": "http://tv-ip572pi.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-362xx/CVE-2022-36202.json b/CVE-2022/CVE-2022-362xx/CVE-2022-36202.json index 94a5653921e..09d53456f98 100644 --- a/CVE-2022/CVE-2022-362xx/CVE-2022-36202.json +++ b/CVE-2022/CVE-2022-362xx/CVE-2022-36202.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36202", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-31T21:15:08.767", - "lastModified": "2022-09-06T17:38:03.300", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-639" } ] } @@ -72,7 +72,8 @@ "url": "http://hshnudr.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-362xx/CVE-2022-36262.json b/CVE-2022/CVE-2022-362xx/CVE-2022-36262.json index b04d565cbc6..2106facba94 100644 --- a/CVE-2022/CVE-2022-362xx/CVE-2022-36262.json +++ b/CVE-2022/CVE-2022-362xx/CVE-2022-36262.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36262", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-15T12:15:20.673", - "lastModified": "2023-11-07T03:49:35.180", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,7 +72,8 @@ "url": "http://taocms.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-365xx/CVE-2022-36530.json b/CVE-2022/CVE-2022-365xx/CVE-2022-36530.json index 08875097618..bc9987324d2 100644 --- a/CVE-2022/CVE-2022-365xx/CVE-2022-36530.json +++ b/CVE-2022/CVE-2022-365xx/CVE-2022-36530.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36530", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-16T13:15:11.593", - "lastModified": "2023-11-07T03:49:39.100", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Modified", "descriptions": [ { @@ -72,7 +72,8 @@ "url": "http://rageframe2.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-365xx/CVE-2022-36552.json b/CVE-2022/CVE-2022-365xx/CVE-2022-36552.json index 321e6592f40..b0d1d71bcdd 100644 --- a/CVE-2022/CVE-2022-365xx/CVE-2022-36552.json +++ b/CVE-2022/CVE-2022-365xx/CVE-2022-36552.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36552", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-30T16:15:08.290", - "lastModified": "2022-09-06T18:43:40.803", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,7 +86,8 @@ "source": "cve@mitre.org", "tags": [ "Permissions Required", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-371xx/CVE-2022-37176.json b/CVE-2022/CVE-2022-371xx/CVE-2022-37176.json index 776d583a93f..5855ceea5e0 100644 --- a/CVE-2022/CVE-2022-371xx/CVE-2022-37176.json +++ b/CVE-2022/CVE-2022-371xx/CVE-2022-37176.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37176", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-30T16:15:08.520", - "lastModified": "2022-09-06T18:38:21.720", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-863" + "value": "NVD-CWE-noinfo" } ] } @@ -86,7 +86,8 @@ "source": "cve@mitre.org", "tags": [ "Permissions Required", - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-400xx/CVE-2022-40047.json b/CVE-2022/CVE-2022-400xx/CVE-2022-40047.json index 9dfa2bce2e5..cf51187c146 100644 --- a/CVE-2022/CVE-2022-400xx/CVE-2022-40047.json +++ b/CVE-2022/CVE-2022-400xx/CVE-2022-40047.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40047", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-11T19:15:20.327", - "lastModified": "2022-10-13T15:37:34.870", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,7 +72,8 @@ "url": "http://flatpress.com", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Vendor Advisory", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-400xx/CVE-2022-40048.json b/CVE-2022/CVE-2022-400xx/CVE-2022-40048.json index 6be3a0846df..98c133bac43 100644 --- a/CVE-2022/CVE-2022-400xx/CVE-2022-40048.json +++ b/CVE-2022/CVE-2022-400xx/CVE-2022-40048.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40048", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-29T01:15:11.560", - "lastModified": "2022-09-29T19:43:05.627", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,7 +72,8 @@ "url": "http://flatpress.com", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40839.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40839.json index 475df610e5c..24f04a2e47e 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40839.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40839.json @@ -2,12 +2,16 @@ "id": "CVE-2022-40839", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-01T17:15:12.367", - "lastModified": "2022-11-03T14:53:59.520", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in the height and width parameter in NdkAdvancedCustomizationFields v3.5.0 allows unauthenticated attackers to exfiltrate database data." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el par\u00e1metro alto y ancho en NdkAdvancedCustomizationFields v3.5.0 permite a atacantes no autenticados filtrar datos de la base de datos." } ], "metrics": { @@ -77,7 +81,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40840.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40840.json index a0b92aed2c6..8599023ebda 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40840.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40840.json @@ -2,12 +2,16 @@ "id": "CVE-2022-40840", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T13:15:19.397", - "lastModified": "2022-11-03T13:53:35.387", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "ndk design NdkAdvancedCustomizationFields 3.5.0 is vulnerable to Cross Site Scripting (XSS) via createPdf.php." + }, + { + "lang": "es", + "value": "ndk design NdkAdvancedCustomizationFields 3.5.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de createPdf.php." } ], "metrics": { @@ -70,7 +74,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40841.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40841.json index efcae0cb6bd..4137e56922c 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40841.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40841.json @@ -2,12 +2,16 @@ "id": "CVE-2022-40841", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-21T18:15:08.957", - "lastModified": "2022-12-28T18:55:38.420", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in NdkAdvancedCustomizationFields v3.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payloads injected into the \"htmlNodes\" parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en NdkAdvancedCustomizationFields v3.5.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de payloads manipulados inyectados en el par\u00e1metro \"htmlNodes\"." } ], "metrics": { @@ -69,7 +73,8 @@ "url": "http://ndkadvancedcustomizationfields.com", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40842.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40842.json index 9ededac9d48..f50dfb632ea 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40842.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40842.json @@ -2,12 +2,16 @@ "id": "CVE-2022-40842", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-22T01:15:32.507", - "lastModified": "2022-11-23T16:04:44.360", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "ndk design NdkAdvancedCustomizationFields 3.5.0 is vulnerable to Server-side request forgery (SSRF) via rotateimg.php." + }, + { + "lang": "es", + "value": "ndk design NdkAdvancedCustomizationFields 3.5.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de rotateimg.php." } ], "metrics": { @@ -70,7 +74,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42991.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42991.json index 6de7b6dda2b..f81ef46b5b7 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42991.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42991.json @@ -2,12 +2,16 @@ "id": "CVE-2022-42991", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-27T14:15:13.343", - "lastModified": "2022-10-28T01:43:19.770", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in Simple Online Public Access Catalog v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Account Full Name field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Stored Cross-Site Scripting (XSS) en Simple Online Public Access Catalog v1.0 permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload inyectado en el campo Edit Account Full Name." } ], "metrics": { @@ -68,7 +72,8 @@ "url": "http://oretnom23.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42992.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42992.json index 692239de860..cf6e8c1dddd 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42992.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42992.json @@ -2,12 +2,16 @@ "id": "CVE-2022-42992", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-27T12:15:10.530", - "lastModified": "2022-10-28T19:45:33.970", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Train Scheduler App v1.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Train Code, Train Name, and Destination text fields." + }, + { + "lang": "es", + "value": "M\u00faltiples vulnerabilidades de Stored Cross-Site Scripting (XSS) en la aplicaci\u00f3n Train Scheduler v1.0 permiten a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en los campos de texto Train Code, Train Name y Destination." } ], "metrics": { @@ -68,7 +72,8 @@ "url": "http://oretnom23.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42993.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42993.json index 1a7a360bb1b..f00752c2df2 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42993.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42993.json @@ -2,12 +2,16 @@ "id": "CVE-2022-42993", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-27T14:15:13.633", - "lastModified": "2022-10-28T01:42:19.440", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Password Storage Application v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Setup page." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Password Storage Application v1.0 contiene una vulnerabilidad de Cross-Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina de Setup." } ], "metrics": { @@ -68,7 +72,8 @@ "url": "http://oretnom23.com", "source": "cve@mitre.org", "tags": [ - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43321.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43321.json index 027bf30b80b..ea11470c7fe 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43321.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43321.json @@ -2,12 +2,16 @@ "id": "CVE-2022-43321", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-09T14:15:17.047", - "lastModified": "2022-11-10T15:10:47.227", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Shopwind v3.4.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the component /common/library/Page.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Shopwind v3.4.3 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) Reflejada en el componente /common/library/Page.php." } ], "metrics": { @@ -68,7 +72,8 @@ "url": "http://yii-shopwind.com", "source": "cve@mitre.org", "tags": [ - "Product" + "Product", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43443.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43443.json index fe4044856ce..240cedca483 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43443.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43443.json @@ -2,12 +2,16 @@ "id": "CVE-2022-43443", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2022-12-19T03:15:10.517", - "lastModified": "2022-12-27T17:46:51.637", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T07:15:08.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, WSR-3200AX4B firmware Ver. 1.25, WSR-2533DHP firmware Ver. 1.08 and earlier, WSR-2533DHP2 firmware Ver. 1.22 and earlier, WSR-A2533DHP2 firmware Ver. 1.22 and earlier, WSR-2533DHP3 firmware Ver. 1.26 and earlier, WSR-A2533DHP3 firmware Ver. 1.26 and earlier, WSR-2533DHPL firmware Ver. 1.08 and earlier, WSR-2533DHPL2 firmware Ver. 1.03 and earlier, WSR-2533DHPLS firmware Ver. 1.07 and earlier, and WCR-1166DS firmware Ver. 1.34 and earlier allows an network-adjacent attacker to execute an arbitrary OS command if a specially crafted request is sent to the management page." + "value": "OS command injection vulnerability in Buffalo network devices allows an network-adjacent attacker to execute an arbitrary OS command if a specially crafted request is sent to the management page." + }, + { + "lang": "es", + "value": "Dispositivos de red Buffalo WSR-3200AX4S firmware Ver. 1.26 y anteriores, versi\u00f3n del firmware WSR-3200AX4B. 1.25, versi\u00f3n del firmware WSR-2533DHP. 1.08 y anteriores, versi\u00f3n del firmware WSR-2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-A2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-A2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-2533DHPL. 1.08 y anteriores, versi\u00f3n del firmware WSR-2533DHPL2. 1.03 y anteriores, versi\u00f3n del firmware WSR-2533DHPLS. 1.07 y anteriores, y la versi\u00f3n del firmware WCR-1166DS. 1.34 y anteriores permiten a un atacante adyacente a la red ejecutar un comando arbitrario del sistema operativo si se env\u00eda una solicitud especialmente manipulada a la p\u00e1gina de administraci\u00f3n." } ], "metrics": { @@ -357,20 +361,12 @@ ], "references": [ { - "url": "https://jvn.jp/en/vu/JVNVU97099584/index.html", - "source": "vultures@jpcert.or.jp", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] + "url": "https://jvn.jp/en/vu/JVNVU97099584/", + "source": "vultures@jpcert.or.jp" }, { - "url": "https://www.buffalo.jp/news/detail/20221205-01.html", - "source": "vultures@jpcert.or.jp", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://www.buffalo.jp/news/detail/20240131-01.html", + "source": "vultures@jpcert.or.jp" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43466.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43466.json index aa46eba94c8..41bc7d864bc 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43466.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43466.json @@ -2,12 +2,16 @@ "id": "CVE-2022-43466", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2022-12-19T03:15:10.577", - "lastModified": "2022-12-27T17:47:39.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T07:15:08.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, WSR-3200AX4B firmware Ver. 1.25, WSR-2533DHP2 firmware Ver. 1.22 and earlier, WSR-A2533DHP2 firmware Ver. 1.22 and earlier, WSR-2533DHP3 firmware Ver. 1.26 and earlier, WSR-A2533DHP3 firmware Ver. 1.26 and earlier, WSR-2533DHPL2 firmware Ver. 1.03 and earlier, WSR-2533DHPLS firmware Ver. 1.07 and earlier, WEX-1800AX4 firmware Ver. 1.13 and earlier, and WEX-1800AX4EA firmware Ver. 1.13 and earlier allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command if a specially crafted request is sent to a specific CGI program." + "value": "OS command injection vulnerability in Buffalo network devices allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command if a specially crafted request is sent to a specific CGI program." + }, + { + "lang": "es", + "value": "Dispositivos de red Buffalo WSR-3200AX4S firmware Ver. 1.26 y anteriores, versi\u00f3n del firmware WSR-3200AX4B. 1.25, versi\u00f3n del firmware WSR-2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-A2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-A2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-2533DHPL2. 1.03 y anteriores, versi\u00f3n del firmware WSR-2533DHPLS. 1.07 y anteriores, versi\u00f3n del firmware WEX-1800AX4. 1.13 y anteriores, y la versi\u00f3n del firmware WEX-1800AX4EA. 1.13 y anteriores permiten a un atacante adyacente a la red con privilegios administrativos ejecutar un comando arbitrario del sistema operativo si se env\u00eda una solicitud especialmente manipulada a un programa CGI espec\u00edfico." } ], "metrics": { @@ -329,20 +333,12 @@ ], "references": [ { - "url": "https://jvn.jp/en/vu/JVNVU97099584/index.html", - "source": "vultures@jpcert.or.jp", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] + "url": "https://jvn.jp/en/vu/JVNVU97099584/", + "source": "vultures@jpcert.or.jp" }, { - "url": "https://www.buffalo.jp/news/detail/20221205-01.html", - "source": "vultures@jpcert.or.jp", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://www.buffalo.jp/news/detail/20240131-01.html", + "source": "vultures@jpcert.or.jp" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43486.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43486.json index 025497c4b89..46a4c306bfc 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43486.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43486.json @@ -2,12 +2,16 @@ "id": "CVE-2022-43486", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2022-12-19T03:15:10.633", - "lastModified": "2022-12-27T20:29:52.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T07:15:09.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Hidden functionality vulnerability in Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, WSR-3200AX4B firmware Ver. 1.25, WSR-2533DHP firmware Ver. 1.08 and earlier, WSR-2533DHP2 firmware Ver. 1.22 and earlier, WSR-A2533DHP2 firmware Ver. 1.22 and earlier, WSR-2533DHP3 firmware Ver. 1.26 and earlier, WSR-A2533DHP3 firmware Ver. 1.26 and earlier, WSR-2533DHPL firmware Ver. 1.08 and earlier, WSR-2533DHPL2 firmware Ver. 1.03 and earlier, WSR-2533DHPLS firmware Ver. 1.07 and earlier, WCR-1166DS firmware Ver. 1.34 and earlier, WEX-1800AX4 firmware Ver. 1.13 and earlier, and WEX-1800AX4EA firmware Ver. 1.13 and earlier allows a network-adjacent attacker with an administrative privilege to enable the debug functionalities and execute an arbitrary command on the affected device." + "value": "Hidden functionality vulnerability in Buffalo network devices allows a network-adjacent attacker with an administrative privilege to enable the debug functionalities and execute an arbitrary command on the affected devices." + }, + { + "lang": "es", + "value": "Vulnerabilidad de funcionalidad oculta en dispositivos de red Buffalo WSR-3200AX4S firmware Ver. 1.26 y anteriores, versi\u00f3n del firmware WSR-3200AX4B. 1.25, versi\u00f3n del firmware WSR-2533DHP. 1.08 y anteriores, versi\u00f3n del firmware WSR-2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-A2533DHP2. 1.22 y anteriores, versi\u00f3n del firmware WSR-2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-A2533DHP3. 1.26 y anteriores, versi\u00f3n del firmware WSR-2533DHPL. 1.08 y anteriores, versi\u00f3n del firmware WSR-2533DHPL2. 1.03 y anteriores, versi\u00f3n del firmware WSR-2533DHPLS. 1.07 y anteriores, versi\u00f3n del firmware WCR-1166DS. 1.34 y anteriores, versi\u00f3n del firmware WEX-1800AX4. 1.13 y anteriores, y la versi\u00f3n del firmware WEX-1800AX4EA. 1.13 y versiones anteriores permiten que un atacante adyacente a la red con privilegios administrativos habilite las funcionalidades de depuraci\u00f3n y ejecute un comando arbitrario en el dispositivo afectado." } ], "metrics": { @@ -413,20 +417,12 @@ ], "references": [ { - "url": "https://jvn.jp/en/vu/JVNVU97099584/index.html", - "source": "vultures@jpcert.or.jp", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] + "url": "https://jvn.jp/en/vu/JVNVU97099584/", + "source": "vultures@jpcert.or.jp" }, { - "url": "https://www.buffalo.jp/news/detail/20221205-01.html", - "source": "vultures@jpcert.or.jp", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://www.buffalo.jp/news/detail/20240131-01.html", + "source": "vultures@jpcert.or.jp" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44944.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44944.json index f55b20fc0d9..dcba8d2e870 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44944.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44944.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44944", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.027", - "lastModified": "2022-12-05T20:38:24.373", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Announcement function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n Agregar anuncio en /index.php?module=help_pages/pages&entities_id=24. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo T\u00edtulo." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44945.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44945.json index 85f25c9540a..edbd8fed27d 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44945.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44945.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44945", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.103", - "lastModified": "2022-12-06T00:58:41.067", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the heading_field_id parameter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro header_field_id." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44946.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44946.json index f38db175a83..69008641cae 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44946.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44946.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44946", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.180", - "lastModified": "2022-12-05T20:37:31.877", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Page function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n Agregar p\u00e1gina en /index.php?module=help_pages/pages&entities_id=24. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo T\u00edtulo." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44947.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44947.json index df48b8fd6d6..c9e996b6503 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44947.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44947.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44947", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.257", - "lastModified": "2022-12-05T20:37:57.117", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Highlight Row feature at /index.php?module=entities/listing_types&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Note field after clicking \"Add\"." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n Resaltar fila en /index.php?module=entities/listing_types&entities_id=24. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios mediante un payload manipulado inyectado en el campo Nota despu\u00e9s de hacer clic en \"Agregar\"." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Permissions Required" + "Permissions Required", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44948.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44948.json index ed94354c726..930245a3b97 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44948.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44948.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44948", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.320", - "lastModified": "2022-12-06T00:53:50.870", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Entities Group feature at/index.php?module=entities/entities_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field after clicking \"Add\"." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n Entities Group at/index.php?module=entities/entities_groups. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo Nombre despu\u00e9s de hacer clic en \"Agregar\"." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44949.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44949.json index 389334ecd76..9eb37714916 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44949.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44949.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44949", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.397", - "lastModified": "2022-12-06T00:54:08.013", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Short Name field." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n Agregar nuevo campo en /index.php?module=entities/fields&entities_id=24. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo Nombre Corto." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44950.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44950.json index 66ff4e924f9..c297d4f16ad 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44950.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44950.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44950", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.463", - "lastModified": "2022-12-06T00:54:20.147", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n Agregar nuevo campo en /index.php?module=entities/fields&entities_id=24. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo Nombre." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44951.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44951.json index 3512a14631f..2feee7b0eaa 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44951.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44951.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44951", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.523", - "lastModified": "2022-12-06T00:54:30.153", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Form tab function at /index.php?module=entities/forms&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en la funci\u00f3n de la pesta\u00f1a Agregar nuevo formulario en /index.php?module=entities/forms&entities_id=24. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo Nombre." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44952.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44952.json index 883c422036f..bde1cd08145 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44952.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44952.json @@ -2,12 +2,16 @@ "id": "CVE-2022-44952", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-02T20:15:14.583", - "lastModified": "2022-12-06T00:54:43.277", + "lastModified": "2024-02-14T01:17:43.863", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in /index.php?module=configuration/application. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Copyright Text field after clicking \"Add\"." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Rukovoditel v3.2.1 conten\u00eda una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en /index.php?module=configuration/application. Esta vulnerabilidad permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo Texto de copyright despu\u00e9s de hacer clic en \"Agregar\"." } ], "metrics": { @@ -69,7 +73,8 @@ "source": "cve@mitre.org", "tags": [ "Broken Link", - "Not Applicable" + "Not Applicable", + "URL Repurposed" ] }, { diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json index 617d6c7e855..54838806851 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20579.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20579", "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:52.577", - "lastModified": "2024-02-13T20:15:52.577", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json index a90e9b56659..36cbda4d346 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20587.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20587", "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:52.677", - "lastModified": "2024-02-13T20:15:52.677", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22293.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22293.json new file mode 100644 index 00000000000..e9e65a08924 --- /dev/null +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22293.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-22293", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:38.193", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in the Intel(R) Thunderbolt(TM) DCH drivers for Windows may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json new file mode 100644 index 00000000000..b478f4966e4 --- /dev/null +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-22311", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:38.517", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json new file mode 100644 index 00000000000..9d2e5e3dde2 --- /dev/null +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-22342", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:39.063", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json new file mode 100644 index 00000000000..c09287c88b7 --- /dev/null +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-22390", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:39.433", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json new file mode 100644 index 00000000000..dbd6b276adb --- /dev/null +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-22848", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:39.757", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json new file mode 100644 index 00000000000..4db2ac15fdc --- /dev/null +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24463", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:40.127", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable information disclosure via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json new file mode 100644 index 00000000000..d19dcce6ade --- /dev/null +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24481", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:40.327", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json new file mode 100644 index 00000000000..892f2eff1ed --- /dev/null +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24542", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:40.513", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Unquoted search path or element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24552.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24552.json index 8a0cbdbb032..054aa769899 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24552.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24552.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24552", "sourceIdentifier": "productcert@siemens.com", "published": "2023-02-14T11:15:15.137", - "lastModified": "2023-03-14T10:15:26.893", - "vulnStatus": "Modified", + "lastModified": "2024-02-14T15:17:29.140", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -73,6 +73,61 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22C0D3BE-0640-49C8-86F1-52966CABA2E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_1:*:*:*:*:*:*:*", + "matchCriteriaId": "DE12CBDF-222E-4DE9-927A-3BDDBFFF1E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_2:*:*:*:*:*:*:*", + "matchCriteriaId": "EEFAAAE5-52B1-48EA-98E1-98A854CBE65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_3:*:*:*:*:*:*:*", + "matchCriteriaId": "D5AFCFBB-ED56-4DDB-89D8-B47A20821AB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_4:*:*:*:*:*:*:*", + "matchCriteriaId": "087A9E78-9E5C-4D94-A251-02F9AB160F54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_5:*:*:*:*:*:*:*", + "matchCriteriaId": "68EE0588-FE7F-4581-9484-52404DB5B99A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_7:*:*:*:*:*:*:*", + "matchCriteriaId": "9F72318F-0E9C-4AB1-9CA2-6527513AE0F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_8:*:*:*:*:*:*:*", + "matchCriteriaId": "63C93992-17F7-4499-BC57-BD67E8A6C508" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_9:*:*:*:*:*:*:*", + "matchCriteriaId": "7180CEA7-150A-4B1D-BDFD-61C320A33148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_10:*:*:*:*:*:*:*", + "matchCriteriaId": "B0244EE5-BF22-491A-A7DE-48F44E2A17FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_11:*:*:*:*:*:*:*", + "matchCriteriaId": "3A583AAD-5B13-4822-AA24-AA7D16305FE2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:*", diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json new file mode 100644 index 00000000000..dac5aa5cd67 --- /dev/null +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24589", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:40.717", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json new file mode 100644 index 00000000000..993cb8569ea --- /dev/null +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24591", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:40.920", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) Binary Configuration Tool software before version 3.4.4 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00973.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json new file mode 100644 index 00000000000..946ebbda1bf --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25073", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:41.693", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) DSA software before version 23.4.33 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25174.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25174.json new file mode 100644 index 00000000000..643f991fc4e --- /dev/null +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25174.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25174", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:42.450", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00928.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json new file mode 100644 index 00000000000..a57c6805c49 --- /dev/null +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25535.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25535", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-14T08:15:08.597", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nDell SupportAssist for Home PCs Installer Executable file version prior to 3.13.2.19 used for initial installation has a high vulnerability that can result in local privilege escalation (LPE). This vulnerability only affects first-time installations done prior to 8th March 2023\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000211410/dell-supportassist-for-home-pcs-security-update-for-installer-executable-file-for-local-privilege-escalation-lpe-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json new file mode 100644 index 00000000000..b45a0896abf --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25769", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:42.970", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json new file mode 100644 index 00000000000..99d24eb10f0 --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25777", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:43.270", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.9, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json new file mode 100644 index 00000000000..67548eaf535 --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25779", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:43.500", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json new file mode 100644 index 00000000000..21c9de8802b --- /dev/null +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25945", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:43.823", + "lastModified": "2024-02-14T15:02:01.453", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00927.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json new file mode 100644 index 00000000000..27698fe0c55 --- /dev/null +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25951", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:44.040", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json new file mode 100644 index 00000000000..a74f63d8d24 --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26585", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:44.230", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json new file mode 100644 index 00000000000..d050a9ff1a2 --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26586", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:44.547", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json new file mode 100644 index 00000000000..7befe54829d --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26591", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:44.893", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Unchecked return value in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an unauthenticated user to potentially enable denial of service via physical access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json new file mode 100644 index 00000000000..64271df4f79 --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26592", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:45.140", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json new file mode 100644 index 00000000000..30ced729a24 --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26596", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:45.380", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json new file mode 100644 index 00000000000..6fec26ceead --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27300", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:45.740", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json new file mode 100644 index 00000000000..c1913696e43 --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27301", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:46.227", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json new file mode 100644 index 00000000000..83d550e948f --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27303", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:46.663", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json new file mode 100644 index 00000000000..0031f45ea82 --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27307", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:46.887", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json new file mode 100644 index 00000000000..a7fdf80e1b6 --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27308", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:47.120", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json new file mode 100644 index 00000000000..6b72559d1c7 --- /dev/null +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27517", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:47.313", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json new file mode 100644 index 00000000000..b8793beba6c --- /dev/null +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28374", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:47.507", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28396.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28396.json new file mode 100644 index 00000000000..8d4e020b417 --- /dev/null +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28396.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28396", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:47.703", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in firmware for some Intel(R) Thunderbol(TM) Controllers versions before 41 may allow a privileged user to enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00895.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json new file mode 100644 index 00000000000..18b19b4eace --- /dev/null +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28407", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:47.893", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json new file mode 100644 index 00000000000..60c0d7af721 --- /dev/null +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28715", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:48.080", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json new file mode 100644 index 00000000000..49b45a3308b --- /dev/null +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28720", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:48.273", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28739.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28739.json new file mode 100644 index 00000000000..1900762d551 --- /dev/null +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28739.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28739", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:48.493", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in some Intel(R) Chipset Driver Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00928.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28745.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28745.json new file mode 100644 index 00000000000..3893cbab99f --- /dev/null +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28745.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28745", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:48.827", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in Intel(R) QSFP+ Configuration Utility software, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00974.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29153.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29153.json new file mode 100644 index 00000000000..ccbc4064d9f --- /dev/null +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29153.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-29153", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:49.303", + "lastModified": "2024-02-14T15:01:55.963", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption for some Intel(R) SPS firmware before version SPS_E5_06.01.04.002.0 may allow a privileged user to potentially enable denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01003.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json new file mode 100644 index 00000000000..62fe85f099d --- /dev/null +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29162.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-29162", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:49.777", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) C++ Compiler Classic before version 2021.8 may allow authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30767.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30767.json new file mode 100644 index 00000000000..bf8ea38ffab --- /dev/null +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30767.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-30767", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:50.013", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-92" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00903.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31189.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31189.json new file mode 100644 index 00000000000..9280f24d8a2 --- /dev/null +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31189.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-31189", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:50.310", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31271.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31271.json new file mode 100644 index 00000000000..1b4530a3e0d --- /dev/null +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31271.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-31271", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:50.503", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31346.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31346.json index d1b3228e560..6360f448940 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31346.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31346", "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:52.737", - "lastModified": "2024-02-13T20:15:52.737", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31347.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31347.json index bb48c281136..7b48cb28169 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31347.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31347.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31347", "sourceIdentifier": "psirt@amd.com", "published": "2024-02-13T20:15:52.790", - "lastModified": "2024-02-13T20:15:52.790", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32280.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32280.json new file mode 100644 index 00000000000..ffa6b60de5c --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32280.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32280", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:50.687", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in some Intel(R) Server Product OpenBMC firmware before versions egs-1.05 may allow an unauthenticated user to enable information disclosure via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00922.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json new file mode 100644 index 00000000000..763487052c7 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32618", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:51.317", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json new file mode 100644 index 00000000000..3d4aea370bf --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32642", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:52.350", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1076" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json new file mode 100644 index 00000000000..d591e6a27cc --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32644", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:53.043", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32646.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32646.json new file mode 100644 index 00000000000..015736974f1 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32646.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32646", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:53.703", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json new file mode 100644 index 00000000000..ce5b3de785b --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32647.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32647", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:54.320", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json new file mode 100644 index 00000000000..a07de5f377e --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32651", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:54.883", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33870.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33870.json new file mode 100644 index 00000000000..6e5c3f32b71 --- /dev/null +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33870.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-33870", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:55.450", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Insecure inherited permissions in some Intel(R) Ethernet tools and driver install software may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-277" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00993.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json new file mode 100644 index 00000000000..a1f3b689b7f --- /dev/null +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-33875", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:56.020", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access.." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34315.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34315.json new file mode 100644 index 00000000000..be8659f77d6 --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34315.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34315", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:56.517", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json new file mode 100644 index 00000000000..a1e9be3651d --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34351", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:57.070", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Buffer underflow in some Intel(R) PCM software before version 202307 may allow an unauthenticated user to potentially enable denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-124" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00954.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json new file mode 100644 index 00000000000..b21c5c3785b --- /dev/null +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34983", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:57.663", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35003.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35003.json new file mode 100644 index 00000000000..f86e6566797 --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35003.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35003", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:58.203", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Path transversal in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-249" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json new file mode 100644 index 00000000000..c664af14926 --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35060", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:58.773", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) Battery Life Diagnostic Tool software before version 2.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00987.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35061.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35061.json new file mode 100644 index 00000000000..e48e57c2f38 --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35061.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35061", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:59.263", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json new file mode 100644 index 00000000000..548a6b414b1 --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35062", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:15:59.780", + "lastModified": "2024-02-14T15:01:51.137", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) DSA software before version 23.4.33 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json new file mode 100644 index 00000000000..a2ba2e66820 --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35121.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35121", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:00.123", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) oneAPI DPC++/C++ Compiler software before version 2023.2.1 may allow authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json new file mode 100644 index 00000000000..ab6ea5a76bd --- /dev/null +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-35769", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:00.460", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) CIP software before version 2.4.10577 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00959.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json new file mode 100644 index 00000000000..f1471192c10 --- /dev/null +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-36490", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:00.667", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper initialization in some Intel(R) MAS software before version 2.3 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json new file mode 100644 index 00000000000..7524d3e01e2 --- /dev/null +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-36493", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:00.873", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) SDK for OpenCL(TM) Applications software may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00992.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json new file mode 100644 index 00000000000..c0fbed6f377 --- /dev/null +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38135", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:01.080", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization in some Intel(R) PM software may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json new file mode 100644 index 00000000000..4c50822c6ca --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38561", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:01.300", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38566.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38566.json new file mode 100644 index 00000000000..e0a9edfcc03 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38566.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38566", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:01.670", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) ISPC software before version 1.21.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00994.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json index 38b3e2840e3..260c5fce8b0 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38960.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38960", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T23:15:08.327", - "lastModified": "2024-02-13T23:15:08.327", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json new file mode 100644 index 00000000000..5cf090da3ed --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39249.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39249", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-14T08:15:09.013", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nDell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000216574/security-update-for-dell-supportassist-for-business-pcs-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39425.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39425.json new file mode 100644 index 00000000000..b1165293812 --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39425.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39425", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:02.220", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) DSA software before version 23.4.33 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39432.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39432.json new file mode 100644 index 00000000000..beecc7cd5fb --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39432.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39432", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:02.880", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control element in some Intel(R) Ethernet tools and driver install software, before versions 28.2, may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00993.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39932.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39932.json new file mode 100644 index 00000000000..86312caa699 --- /dev/null +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39932.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39932", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:03.540", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in the Intel(R) SUR for Gameplay Software before version 2.0.1901 may allow a privillaged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01004.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39941.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39941.json new file mode 100644 index 00000000000..5a921fce07d --- /dev/null +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39941.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39941", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:04.240", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) SUR software before version 2.4.10587 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40154.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40154.json new file mode 100644 index 00000000000..e93e8b3d974 --- /dev/null +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40154.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40154", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:04.627", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the Intel(R) SUR for Gameplay Software before version 2.0.1901 may allow privillaged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01004.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json new file mode 100644 index 00000000000..be7569209e6 --- /dev/null +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40156", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:04.863", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in some Intel(R) SSU software before version 3.0.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40161.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40161.json new file mode 100644 index 00000000000..7d12f2912b8 --- /dev/null +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40161.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40161", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:05.137", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel Unite(R) Client software before version 4.2.35041 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00981.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41090.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41090.json new file mode 100644 index 00000000000..5f8ff10a69f --- /dev/null +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41090.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41090", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:05.373", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Race condition in some Intel(R) MAS software before version 2.3 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 1.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-421" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41091.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41091.json new file mode 100644 index 00000000000..84153141f71 --- /dev/null +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41091.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41091", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:05.587", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) MPI Library Software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01005.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41231.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41231.json new file mode 100644 index 00000000000..e350534027f --- /dev/null +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41231.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41231", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:05.870", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in some ACAT software maintained by Intel(R) before version 2.0.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00913.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41252.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41252.json new file mode 100644 index 00000000000..94da947a415 --- /dev/null +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41252.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41252", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:06.097", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in some Intel(R) QAT software drivers for Windows before version QAT1.7-W-1.11.0 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01000.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json index 1b9cffd5174..bd2e9ff50a0 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41703.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41703", "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:10.480", - "lastModified": "2024-02-12T14:19:54.330", + "lastModified": "2024-02-14T03:15:11.140", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/10", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", "source": "security@open-xchange.com" diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json index 44ca7dc818d..663431e3bb4 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41704.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41704", "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:10.697", - "lastModified": "2024-02-12T14:19:54.330", + "lastModified": "2024-02-14T03:15:12.560", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/10", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", "source": "security@open-xchange.com" diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41705.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41705.json index a88506e688e..fa0fb79f1af 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41705.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41705.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41705", "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:10.880", - "lastModified": "2024-02-12T14:19:54.330", + "lastModified": "2024-02-14T03:15:12.667", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,19 +38,11 @@ } ] }, - "weaknesses": [ - { - "source": "security@open-xchange.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-400" - } - ] - } - ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/10", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", "source": "security@open-xchange.com" diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41706.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41706.json index 2290718ab45..9fa39f00ad5 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41706.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41706.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41706", "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:11.073", - "lastModified": "2024-02-12T14:19:54.330", + "lastModified": "2024-02-14T03:15:12.867", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/10", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", "source": "security@open-xchange.com" diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41707.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41707.json index fdaf45babc7..433f65c6dc6 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41707.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41707.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41707", "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:11.253", - "lastModified": "2024-02-12T14:19:54.330", + "lastModified": "2024-02-14T03:15:12.960", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/10", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", "source": "security@open-xchange.com" diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41708.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41708.json index 9a532855e6f..a9e00566d4f 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41708.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41708.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41708", "sourceIdentifier": "security@open-xchange.com", "published": "2024-02-12T09:15:11.470", - "lastModified": "2024-02-12T14:19:54.330", + "lastModified": "2024-02-14T03:15:13.067", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/10", + "source": "security@open-xchange.com" + }, { "url": "https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json", "source": "security@open-xchange.com" diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42776.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42776.json new file mode 100644 index 00000000000..6b640acc457 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42776.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-42776", + "sourceIdentifier": "secure@intel.com", + "published": "2024-02-14T14:16:06.367", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) SGX DCAP software for Windows before version 1.19.100.3 may allow an authenticateed user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01014.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42915.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42915.json index 2052781394a..53f07289820 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42915.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42915.json @@ -2,178 +2,14 @@ "id": "CVE-2023-42915", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:10.123", - "lastModified": "2024-01-29T19:53:50.083", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T03:15:13.210", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Multiple issues were addressed by updating to curl version 8.4.0. This issue is fixed in macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 and iPadOS 16.7.5. Multiple issues in curl." - }, - { - "lang": "es", - "value": "Se solucionaron varios problemas actualizando a la versi\u00f3n 8.4.0 de curl. Este problema se solucion\u00f3 en macOS Ventura 13.6.4, macOS Sonoma 14.2, macOS Monterey 12.7.3, iOS 16.7.5 y iPadOS 16.7.5. M\u00faltiples problemas en curl." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-noinfo" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*", - "versionEndExcluding": "8.4.0", - "matchCriteriaId": "9D70EB17-D125-4887-B09C-0EC8ACF60308" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", - "versionStartExcluding": "16.0", - "versionEndExcluding": "16.7.5", - "matchCriteriaId": "8C2307FA-1412-4727-AD29-541A337A9B97" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", - "versionStartExcluding": "16.0", - "versionEndExcluding": "16.7.5", - "matchCriteriaId": "78404384-8393-4F57-8076-C84BCFD58B1D" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "12.0", - "versionEndExcluding": "12.7.3", - "matchCriteriaId": "ECD0F581-7DA4-428A-A1F5-C9A86DDD99D7" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "13.0", - "versionEndExcluding": "13.6.4", - "matchCriteriaId": "A3916CD8-E6D5-4786-903E-B86026859CE6" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "14.0", - "versionEndExcluding": "14.2", - "matchCriteriaId": "6892DEBD-024E-414B-9282-DCCCF23A3BDD" - } - ] - } - ] - } - ], - "references": [ - { - "url": "http://seclists.org/fulldisclosure/2024/Jan/34", - "source": "product-security@apple.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "http://seclists.org/fulldisclosure/2024/Jan/37", - "source": "product-security@apple.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "http://seclists.org/fulldisclosure/2024/Jan/38", - "source": "product-security@apple.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "https://support.apple.com/en-us/HT214036", - "source": "product-security@apple.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] - }, - { - "url": "https://support.apple.com/en-us/HT214057", - "source": "product-security@apple.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] - }, - { - "url": "https://support.apple.com/en-us/HT214058", - "source": "product-security@apple.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] - }, - { - "url": "https://support.apple.com/en-us/HT214063", - "source": "product-security@apple.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] - }, - { - "url": "https://support.apple.com/kb/HT214036", - "source": "product-security@apple.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json new file mode 100644 index 00000000000..2c9c0164c25 --- /dev/null +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44283.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-44283", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-14T08:15:09.347", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nIn Dell SupportAssist for Home PCs (between v3.0 and v3.14.1) and SupportAssist for Business PCs (between v3.0 and v3.4.1), a security concern has been identified, impacting locally authenticated users on their respective PCs. This issue may potentially enable privilege escalation and the execution of arbitrary code, in the Windows system context, and confined to that specific local PC.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000219086/dsa-2023-401-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-user-interface-component", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json new file mode 100644 index 00000000000..85b16e49f4e --- /dev/null +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44293.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-44293", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-14T08:15:09.683", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nIn Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of IP Range Rest API.\u00a0This issue may potentially lead to unintentional information disclosure from the product database.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000219372/dsa-2023-403-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json new file mode 100644 index 00000000000..d269e590f60 --- /dev/null +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44294.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-44294", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-14T09:15:35.743", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nIn Dell Secure Connect Gateway Application and Secure Connect Gateway Appliance (between v5.10.00.00 and v5.18.00.00), a security concern has been identified, where a malicious user with a valid User session may inject malicious content in filters of Collection Rest API. \nThis issue may potentially lead to unintentional information disclosure from the product database.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000219372/dsa-2023-403-security-update-for-dell-secure-connect-gateway-application-and-appliance-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json index 06acb21f2e3..b3dbe0d52d1 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46104", "sourceIdentifier": "security@apache.org", "published": "2023-12-19T10:15:07.517", - "lastModified": "2023-12-29T17:05:16.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T14:16:06.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,14 @@ "Mailing List" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/14/2", + "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/14/3", + "source": "security@apache.org" + }, { "url": "https://lists.apache.org/thread/yxbxg4wryb7cb7wyybk11l5nqy0rsrvl", "source": "security@apache.org", diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46186.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46186.json new file mode 100644 index 00000000000..b48f994a5f9 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46186.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46186", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-14T15:15:08.220", + "lastModified": "2024-02-14T16:13:22.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Jazz for Service Management 1.1.3.20 could allow an unauthorized user to obtain sensitive file information using forced browsing due to improper access controls. IBM X-Force ID: 269929." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269929", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116830", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48985.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48985.json new file mode 100644 index 00000000000..6278dc59ab1 --- /dev/null +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48985.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-48985", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T09:15:36.073", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the login.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json new file mode 100644 index 00000000000..93735d43c29 --- /dev/null +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48986.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-48986", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T09:15:36.130", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the users.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48987.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48987.json new file mode 100644 index 00000000000..806ad39c98e --- /dev/null +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48987.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-48987", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T09:15:36.193", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Blind SQL Injection vulnerability in CU Solutions Group (CUSG) Content Management System (CMS) before v.7.75 allows a remote attacker to execute arbitrary code, escalate privileges, and obtain sensitive information via a crafted script to the pages.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.lmgsecurity.com/news/critical-software-vulnerabilities-impacting-credit-unions-discovered-by-lmg-security-researcher-immediate-action-recommended/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json new file mode 100644 index 00000000000..cc7b0ad0b3e --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50387.json @@ -0,0 +1,52 @@ +{ + "id": "CVE-2023-50387", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T16:15:45.300", + "lastModified": "2024-02-14T16:15:45.300", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses when there is a zone with many DNSKEY and RRSIG records, aka the \"KeyTrap\" issue. The protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://datatracker.ietf.org/doc/html/rfc4035", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html", + "source": "cve@mitre.org" + }, + { + "url": "https://kb.isc.org/docs/cve-2023-50387", + "source": "cve@mitre.org" + }, + { + "url": "https://news.ycombinator.com/item?id=39367411", + "source": "cve@mitre.org" + }, + { + "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.athene-center.de/aktuelles/key-trap", + "source": "cve@mitre.org" + }, + { + "url": "https://www.isc.org/blogs/2024-bind-security-release/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50711.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50711.json index a5e747f4bef..22853711ea5 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50711.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50711.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50711", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-02T20:15:10.250", - "lastModified": "2024-02-10T02:15:42.177", + "lastModified": "2024-02-14T03:15:13.793", "vulnStatus": "Modified", "descriptions": [ { @@ -117,6 +117,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5XMCLV2P3ANS3XN4NXZTV4PUNTLWUNJ/", "source": "security-advisories@github.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJI7D273R6G5RUC246KTI2YY3AXZKZMD/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json new file mode 100644 index 00000000000..f3f7adcda3c --- /dev/null +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50868.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-50868", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T16:15:45.377", + "lastModified": "2024-02-14T16:15:45.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \"NSEC3\" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://datatracker.ietf.org/doc/html/rfc5155", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html", + "source": "cve@mitre.org" + }, + { + "url": "https://kb.isc.org/docs/cve-2023-50868", + "source": "cve@mitre.org" + }, + { + "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.isc.org/blogs/2024-bind-security-release/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5122.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5122.json new file mode 100644 index 00000000000..4bc773c67a7 --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5122.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5122", + "sourceIdentifier": "security@grafana.com", + "published": "2024-02-14T15:15:08.437", + "lastModified": "2024-02-14T16:13:22.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Grafana is an open-source platform for monitoring and observability. The CSV datasource plugin is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing CSV data from a remote endpoint configured by an administrator. If this plugin was configured to send requests to a bare host with no path (e.g. https://www.example.com/ https://www.example.com/` ), requests to an endpoint other than the one configured by the administrator could be triggered by a specially crafted request from any user, resulting in an SSRF vector. AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://grafana.com/security/security-advisories/cve-2023-5122/", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5123.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5123.json new file mode 100644 index 00000000000..1c6a5f3502a --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5123.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5123", + "sourceIdentifier": "security@grafana.com", + "published": "2024-02-14T15:15:08.620", + "lastModified": "2024-02-14T16:13:22.177", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "The JSON datasource plugin ( https://grafana.com/grafana/plugins/marcusolsson-json-datasource/ https://grafana.com/grafana/plugins/marcusolsson-json-datasource/ ) is a Grafana Labs maintained plugin for Grafana that allows for retrieving and processing JSON data from a remote endpoint (including a specific sub-path) configured by an administrator. Due to inadequate sanitization of the dashboard-supplied path parameter, it was possible to include path traversal characters (../) in the path parameter and send requests to paths on the configured endpoint outside the configured sub-path. \n\n\n\n\n\n \n \n \n\n\n\n\n\n\n \n \n This means that if the datasource was configured by an administrator to point at some sub-path of a domain (e.g. https://example.com/api/some_safe_api/ https://example.com/api/some_safe_api/ ), it was possible for an editor to create a dashboard referencing the datasource which issues queries containing path traversal characters, which would in turn cause the datasource to instead query arbitrary subpaths on the configured domain (e.g. https://example.com/api/admin_api/) https://example.com/api/admin_api/) .\n\nIn the rare case that this plugin is configured by an administrator to point back at the Grafana instance itself, this vulnerability becomes considerably more severe, as an administrator browsing a maliciously configured panel could be compelled to make requests to Grafana administrative API endpoints with their credentials, resulting in the potential for privilege escalation, hence the high score for this vulnerability.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://grafana.com/security/security-advisories/cve-2023-5123/", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json index b582e8440b8..7586dcac8c1 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5992", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.147", - "lastModified": "2024-02-09T01:00:00.933", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T14:16:06.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -60,7 +60,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Primary", "description": [ { @@ -70,12 +70,12 @@ ] }, { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-203" } ] } diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6134.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6134.json index b473151f81c..16b99be51d2 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6134.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6134.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6134", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-14T22:15:44.087", - "lastModified": "2024-02-02T16:18:27.150", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T03:15:14.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -298,6 +298,26 @@ "Vendor Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0798", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0799", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0800", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0801", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0804", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6134", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json index 761f209c468..d3f60eead1e 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6152", "sourceIdentifier": "security@grafana.com", "published": "2024-02-13T22:15:45.430", - "lastModified": "2024-02-13T22:15:45.430", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6291.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6291.json index 99f2e501749..43942472c89 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6291.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6291.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6291", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-26T15:15:08.280", - "lastModified": "2024-02-06T16:09:02.867", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T03:15:14.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -272,6 +272,26 @@ "Vendor Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0798", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0799", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0800", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0801", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0804", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6291", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6441.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6441.json new file mode 100644 index 00000000000..e7a9957b5df --- /dev/null +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6441.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6441", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-02-14T14:16:06.933", + "lastModified": "2024-02-14T15:01:46.050", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in UNI-PA University Marketing & Computer Internet Trade Inc. University Information System allows SQL Injection.This issue affects University Information System: before 12.12.2023.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0102", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json index 9fe43777342..514b429580e 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6815", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2024-02-13T07:15:46.843", - "lastModified": "2024-02-13T14:01:07.747", + "lastModified": "2024-02-14T04:15:08.497", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ "url": "https://jvn.jp/vu/JVNVU95085830/index.html", "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-044-01", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, { "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-021_en.pdf", "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6927.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6927.json index e4c40bd7c0c..483aa41a031 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6927.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6927.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6927", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-18T23:15:10.027", - "lastModified": "2024-01-09T21:15:07.990", + "lastModified": "2024-02-14T03:15:14.550", "vulnStatus": "Modified", "descriptions": [ { @@ -141,6 +141,26 @@ "url": "https://access.redhat.com/errata/RHSA-2024:0101", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0798", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0799", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0800", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0801", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0804", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6927", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0584.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0584.json index 7ea0a2b0198..808f26090c5 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0584.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0584.json @@ -2,141 +2,14 @@ "id": "CVE-2024-0584", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T14:15:49.643", - "lastModified": "2024-01-23T20:18:49.657", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T06:15:47.283", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak." - }, - { - "lang": "es", - "value": "Se encontr\u00f3 un problema de use after free en igmp_start_timer en net/ipv4/igmp.c en el subcomponente de red del kernel de Linux. Este fallo permite a un usuario local observar un problema de use after free cuando recibe un paquete de consulta igmp, lo que provoca una fuga de informaci\u00f3n del kernel." + "value": "Rejected reason: Do not use this CVE as it is duplicate of CVE-2023-6932" } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - }, - { - "source": "secalert@redhat.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N", - "attackVector": "LOCAL", - "attackComplexity": "HIGH", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 0.0, - "baseSeverity": "NONE" - }, - "exploitabilityScore": 1.0, - "impactScore": 0.0 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-416" - } - ] - }, - { - "source": "secalert@redhat.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-416" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.7", - "matchCriteriaId": "668F5607-E136-4E8E-86F2-316E9DC41ADC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*", - "matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*", - "matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://access.redhat.com/security/cve/CVE-2024-0584", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258584", - "source": "secalert@redhat.com", - "tags": [ - "Exploit", - "Issue Tracking", - "Third Party Advisory" - ] - }, - { - "url": "https://lore.kernel.org/netdev/170083982540.9628.4546899811301303734.git-patchwork-notify@kernel.org/T/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0639.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0639.json index ea474dd4ebb..8c06d144004 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0639.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0639.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0639", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-17T16:15:46.810", - "lastModified": "2024-01-24T21:08:28.330", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T13:15:08.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,19 +41,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 4.7, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 1.0, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0641.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0641.json index cf7be56fbcd..26edb7809c6 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0641.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0641.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0641", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-17T16:15:47.003", - "lastModified": "2024-01-24T21:04:44.020", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T13:15:08.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,19 +41,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 4.7, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 1.0, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json index 7f214335f5e..05dea47563f 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1209", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:08.143", - "lastModified": "2024-02-06T01:00:55.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T16:51:40.300", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads." + }, + { + "lang": "es", + "value": "El complemento LearnDash LMS para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.10.1 incluida a trav\u00e9s del acceso directo a archivos debido a una protecci\u00f3n insuficiente de las tareas cargadas. Esto hace posible que atacantes no autenticados obtengan esas cargas." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -34,18 +58,58 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:learndash:learndash:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.10.3", + "matchCriteriaId": "F60A9AD2-5715-460B-BDA8-D04EBB7CDF1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/karlemilnikka/CVE-2024-1209", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.learndash.com/release-notes/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7191955e-0db1-4ad1-878b-74f90ca59c91?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json index f6b64fb2e76..31761ad4667 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1485", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-14T00:15:46.783", - "lastModified": "2024-02-14T00:15:46.783", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json index 3bf93469c70..fa0109f9ebe 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20290.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20290", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-02-07T17:15:10.517", - "lastModified": "2024-02-13T02:15:07.987", + "lastModified": "2024-02-14T03:15:14.850", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FXZYVDNV66RNMNVJOHAJAYRZV4U64CQ/", + "source": "ykramarz@cisco.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MUDUPAHAAV6FPB2C2QIQCFJ4SHYBOTY/", "source": "ykramarz@cisco.com" diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20813.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20813.json index 78c2f061d90..ac90d0ce5d5 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20813.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20813", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:08.297", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:18:07.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20814.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20814.json index 12c2548a71a..a80b44124c7 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20814.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20814", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:08.533", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:17:09.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20815.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20815.json index d47807e348e..6a9cc27a645 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20815.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20815.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20815", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:08.720", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:22:16.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20816.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20816.json index f170c39a1d3..61f746b3393 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20816.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20816", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:08.907", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:25:47.030", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20817.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20817.json index 9c72c3e102a..cab6952039a 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20817.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20817", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:09.097", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:42:20.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20818.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20818.json index 48e1249d983..ea935af9929 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20818.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20818", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:09.287", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T16:13:49.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20819.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20819.json index 686e44a196d..6a3cca5f7e4 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20819.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20819.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20819", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:09.480", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T16:20:42.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,482 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20820.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20820.json index 4ad5634990c..9420e1e1c61 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20820.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20820.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20820", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-02-06T03:15:09.670", - "lastModified": "2024-02-06T13:53:38.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T16:19:05.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,472 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*", + "matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5B6BE249-B428-4A38-8CF0-3C67F33E6DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "775029A9-312F-4A59-9D5A-D0D8396F2FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=02", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json index 9182ccb1b5b..982ab62e02d 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22318.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22318", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-09T01:15:09.440", - "lastModified": "2024-02-09T18:15:08.680", + "lastModified": "2024-02-14T03:15:15.017", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html", "source": "psirt@us.ibm.com" }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/7", + "source": "psirt@us.ibm.com" + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279091", "source": "psirt@us.ibm.com" diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json new file mode 100644 index 00000000000..df33f6acedd --- /dev/null +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22455.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-22455", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-14T07:15:09.803", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "\nDell E-Lab Navigator, [3.1.9, 3.2.0], contains an Insecure Direct Object Reference Vulnerability in Feedback submission. An attacker could potentially exploit this vulnerability, to manipulate the email's appearance, potentially deceiving recipients and causing reputational and security risks.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000222015/dsa-2024-073-security-update-for-mobility-e-lab-navigator-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23749.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23749.json index 06feda24c42..aa6b329a903 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23749.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23749", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-09T08:15:08.530", - "lastModified": "2024-02-09T14:31:23.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T13:59:39.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,95 @@ "value": "Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a la inyecci\u00f3n de comandos a trav\u00e9s de la variable de nombre de archivo, se produce debido a una sanitizaci\u00f3n y validaci\u00f3n de entrada insuficientes, no se pueden escapar caracteres especiales y llamadas inseguras al sistema (en las l\u00edneas 2369-2390). Esto permite a un atacante agregar entradas dentro de la variable de nombre de archivo, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "0.76.1.13", + "matchCriteriaId": "8ACE5337-4545-4F4C-8406-2E201A9FA660" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/13", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/14", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://blog.defcesco.io/CVE-2024-23749", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json new file mode 100644 index 00000000000..e0cbab692ce --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23783.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23783", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T10:15:08.540", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper authentication vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to access the affected product without authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json new file mode 100644 index 00000000000..f1c50f229cf --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23784.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23784", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T10:15:08.610", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Improper access control vulnerability exists in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier, which may allow a network-adjacent unauthenticated attacker to obtain a username and its hashed password displayed on the management page of the affected product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json new file mode 100644 index 00000000000..1da53031ad6 --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23785.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23785", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T10:15:08.663", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site request forgery vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a remote unauthenticated attacker to change the product settings." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json new file mode 100644 index 00000000000..4989020146c --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23786.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23786", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T10:15:08.727", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site scripting vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to execute an arbitrary script on the web browser of the user who is accessing the management page of the affected product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23787.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23787.json new file mode 100644 index 00000000000..e9a28113718 --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23787.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23787", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T10:15:08.780", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Path traversal vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to obtain an arbitrary file in the affected product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json new file mode 100644 index 00000000000..28fd1370d04 --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23788.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23788", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T10:15:08.830", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Server-side request forgery vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to send an arbitrary HTTP request (GET) from the affected product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23789.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23789.json new file mode 100644 index 00000000000..667fca3078c --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23789.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23789", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-02-14T11:15:08.200", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command on the affected product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_jp.pdf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU94591337/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json new file mode 100644 index 00000000000..91412e6a08e --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23952.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-23952", + "sourceIdentifier": "security@apache.org", + "published": "2024-02-14T12:15:47.293", + "lastModified": "2024-02-14T14:16:07.460", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "This is a duplicate for CVE-2023-46104. With correct CVE version ranges for affected Apache Superset.\n \nUncontrolled resource consumption can be triggered by authenticated attacker that uploads a malicious ZIP to import database, dashboards or datasets. \u00a0\nThis vulnerability exists in Apache Superset versions up to and including 2.1.2 and versions 3.0.0, 3.0.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/14/2", + "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/14/3", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/zc58zvm4414molqn2m4d4vkrbrsxdksx", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24142.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24142.json index b62e18ad858..064e64d3c33 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24142.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24142.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24142", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-13T21:15:08.210", - "lastModified": "2024-02-13T21:15:08.210", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json index c87f9d2ebbc..675e05a5aad 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24570", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T17:15:11.403", - "lastModified": "2024-02-09T20:21:06.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-14T04:15:08.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -96,6 +96,10 @@ } ], "references": [ + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/17", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/statamic/cms/security/advisories/GHSA-vqxq-hvxw-9mv9", "source": "security-advisories@github.com", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24690.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24690.json index b415a827ca0..dc634fdacca 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24690.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24690.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24690", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.000", - "lastModified": "2024-02-14T00:15:47.000", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24691.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24691.json index beba2f06374..a1a5e41802d 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24691.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24691.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24691", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.200", - "lastModified": "2024-02-14T00:15:47.200", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24695.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24695.json index 6cef8238d62..35b67250430 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24695.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24695", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.393", - "lastModified": "2024-02-14T00:15:47.393", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24696.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24696.json index 833d27e7b59..b6d709a926d 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24696.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24696", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.583", - "lastModified": "2024-02-14T00:15:47.583", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24697.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24697.json index 040b73b9462..af3143a607b 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24697.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24697", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.770", - "lastModified": "2024-02-14T00:15:47.770", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json index 94d66c0a57d..8b56a260d1c 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24698", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:47.967", - "lastModified": "2024-02-14T00:15:47.967", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24699.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24699.json index 6924c6857ff..4d70abf6cb2 100644 --- a/CVE-2024/CVE-2024-246xx/CVE-2024-24699.json +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24699", "sourceIdentifier": "security@zoom.us", "published": "2024-02-14T00:15:48.150", - "lastModified": "2024-02-14T00:15:48.150", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25003.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25003.json index 02a4aec65fc..f7469ac212c 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25003.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25003", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-09T07:16:00.807", - "lastModified": "2024-02-09T14:31:23.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:03:25.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,94 @@ "value": "Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del nombre de host, que se produce debido a una verificaci\u00f3n de los l\u00edmites y una sanitizaci\u00f3n de entrada insuficientes. Esto permite a un atacante sobrescribir la memoria adyacente, lo que conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "0.76.1.13", + "matchCriteriaId": "8ACE5337-4545-4F4C-8406-2E201A9FA660" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/13", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/14", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25004.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25004.json index 30d7f36e46e..3c18cd5aee0 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25004.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25004", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-09T07:16:00.930", - "lastModified": "2024-02-09T14:31:23.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-14T14:02:58.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,92 @@ "value": "Las versiones de KiTTY 0.76.1.13 y anteriores son vulnerables a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del nombre de usuario, que se produce debido a una verificaci\u00f3n de los l\u00edmites y una sanitizaci\u00f3n de entrada insuficientes (en la l\u00ednea 2600). Esto permite a un atacante sobrescribir la memoria adyacente, lo que conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "0.76.1.13", + "matchCriteriaId": "8ACE5337-4545-4F4C-8406-2E201A9FA660" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/13", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2024/Feb/14", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json index c7574ead821..eaf355ed852 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25118", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:08.417", - "lastModified": "2024-02-13T23:15:08.417", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json index 53a6af0f9a5..9c3200aa7e8 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25119", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:08.640", - "lastModified": "2024-02-13T23:15:08.640", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json index 1df0b3dd1d7..44f33c7eb7c 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25120", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:08.867", - "lastModified": "2024-02-13T23:15:08.867", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json index 263982bc3ab..7cff70bbfab 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25121", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-13T23:15:09.080", - "lastModified": "2024-02-13T23:15:09.080", - "vulnStatus": "Received", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json new file mode 100644 index 00000000000..c5f2bd5a719 --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25125.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25125", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-02-14T03:15:15.153", + "lastModified": "2024-02-14T13:59:35.580", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Digdag is an open source tool that to build, run, schedule, and monitor complex pipelines of tasks across various platforms. Treasure Data's digdag workload automation system is susceptible to a path traversal vulnerability if it's configured to store log files locally. This issue may lead to information disclosure and has been addressed in release version 0.10.5.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/treasure-data/digdag/commit/eae89b0daf6c62f12309d8c7194454dfb18cc5c3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/treasure-data/digdag/security/advisories/GHSA-5mp4-32rr-v3x5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25207.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25207.json new file mode 100644 index 00000000000..32109e89898 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25207.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25207", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:08.803", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Barangay Population Monitoring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Add Resident function at /barangay-population-monitoring-system/masterlist.php. This vulnerabiity allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Contact Number parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json new file mode 100644 index 00000000000..e14cf85eaec --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25208.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25208", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:08.863", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Barangay Population Monitoring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Add Resident function at /barangay-population-monitoring-system/masterlist.php. This vulnerabiity allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25209.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25209.json new file mode 100644 index 00000000000..3aab3c3fb0f --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25209.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25209", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:08.910", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Barangay Population Monitoring System 1.0 was discovered to contain a SQL injection vulnerability via the resident parameter at /endpoint/delete-resident.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20SQL%20Injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25210.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25210.json new file mode 100644 index 00000000000..f0795f9a156 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25210.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25210", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:08.967", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Simple Expense Tracker v1.0 was discovered to contain a SQL injection vulnerability via the expense parameter at /endpoint/delete_expense.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tacker%20-%20SQL%20Injection-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25211.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25211.json new file mode 100644 index 00000000000..be1e7897a49 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25211.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25211", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.013", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Simple Expense Tracker v1.0 was discovered to contain a SQL injection vulnerability via the category parameter at /endpoint/delete_category.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json new file mode 100644 index 00000000000..af0ff164a3f --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25212.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25212", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.063", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Employee Managment System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /delete.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%204.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25213.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25213.json new file mode 100644 index 00000000000..556d8b3e48a --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25213.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25213", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.117", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Employee Managment System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /edit.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%203.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25214.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25214.json new file mode 100644 index 00000000000..2a98e82eccf --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25214.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25214", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.167", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Employee Managment System v1.0 allows attackers to bypass authentication via injecting a crafted payload into the E-mail and Password parameters at /alogin.html." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25215.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25215.json new file mode 100644 index 00000000000..1c0d07c89ea --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25215.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25215", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.223", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Employee Managment System v1.0 was discovered to contain a SQL injection vulnerability via the pwd parameter at /aprocess.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%202.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25216.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25216.json new file mode 100644 index 00000000000..db39bfe3dde --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25216.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25216", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.273", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Employee Managment System v1.0 was discovered to contain a SQL injection vulnerability via the mailud parameter at /aprocess.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%201.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25217.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25217.json new file mode 100644 index 00000000000..5aecc4aaf38 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25217.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25217", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.323", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Online Medicine Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /omos/?p=products/view_product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection%28Unauthenticated%29.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25218.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25218.json new file mode 100644 index 00000000000..eb806af234b --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25218.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25218", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.370", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Project Name parameter /TaskManager/Projects.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json new file mode 100644 index 00000000000..605bcb36694 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25219.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25219", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.423", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Task Name parameter /TaskManager/Task.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-%202.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25220.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25220.json new file mode 100644 index 00000000000..9ea656d277f --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25220.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25220", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.477", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Task Manager App v1.0 was discovered to contain a SQL injection vulnerability via the taskID parameter at /TaskManager/EditTask.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%202.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25221.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25221.json new file mode 100644 index 00000000000..8bb4d6fdb68 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25221.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25221", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.523", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Note Section parameter at /TaskManager/Tasks.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-3.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25222.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25222.json new file mode 100644 index 00000000000..a48243271b4 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25222.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25222", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.570", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Task Manager App v1.0 was discovered to contain a SQL injection vulnerability via the projectID parameter at /TaskManager/EditProject.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%201.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25223.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25223.json new file mode 100644 index 00000000000..206605be15b --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25223.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25223", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.627", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Simple Admin Panel App v1.0 was discovered to contain a SQL injection vulnerability via the orderID parameter at /adminView/viewEachOrder.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25224.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25224.json new file mode 100644 index 00000000000..e85b262df7c --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25224.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25224", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.680", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Simple Admin Panel App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Size Number parameter under the Add Size function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25225.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25225.json new file mode 100644 index 00000000000..892649bb3c5 --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25225.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25225", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.723", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Simple Admin Panel App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Category Name parameter under the Add Category function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%201.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25226.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25226.json new file mode 100644 index 00000000000..607da4b755d --- /dev/null +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25226.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25226", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-14T15:15:09.767", + "lastModified": "2024-02-14T16:13:16.563", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Simple Admin Panel App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Category Name parameter under the Add Category function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index bde81f84305..25317d8b9f3 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-14T00:55:24.556709+00:00 +2024-02-14T17:08:42.015866+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-14T00:27:40.143000+00:00 +2024-02-14T16:59:56.220000+00:00 ``` ### Last Data Feed Release @@ -23,48 +23,75 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-02-13T01:00:28.283503+00:00 +2024-02-14T01:00:28.557652+00:00 ``` ### Total Number of included CVEs ```plain -238401 +238520 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `119` -* [CVE-2023-38960](CVE-2023/CVE-2023-389xx/CVE-2023-38960.json) (`2024-02-13T23:15:08.327`) -* [CVE-2024-25118](CVE-2024/CVE-2024-251xx/CVE-2024-25118.json) (`2024-02-13T23:15:08.417`) -* [CVE-2024-25119](CVE-2024/CVE-2024-251xx/CVE-2024-25119.json) (`2024-02-13T23:15:08.640`) -* [CVE-2024-25120](CVE-2024/CVE-2024-251xx/CVE-2024-25120.json) (`2024-02-13T23:15:08.867`) -* [CVE-2024-25121](CVE-2024/CVE-2024-251xx/CVE-2024-25121.json) (`2024-02-13T23:15:09.080`) -* [CVE-2024-1485](CVE-2024/CVE-2024-14xx/CVE-2024-1485.json) (`2024-02-14T00:15:46.783`) -* [CVE-2024-24690](CVE-2024/CVE-2024-246xx/CVE-2024-24690.json) (`2024-02-14T00:15:47.000`) -* [CVE-2024-24691](CVE-2024/CVE-2024-246xx/CVE-2024-24691.json) (`2024-02-14T00:15:47.200`) -* [CVE-2024-24695](CVE-2024/CVE-2024-246xx/CVE-2024-24695.json) (`2024-02-14T00:15:47.393`) -* [CVE-2024-24696](CVE-2024/CVE-2024-246xx/CVE-2024-24696.json) (`2024-02-14T00:15:47.583`) -* [CVE-2024-24697](CVE-2024/CVE-2024-246xx/CVE-2024-24697.json) (`2024-02-14T00:15:47.770`) -* [CVE-2024-24698](CVE-2024/CVE-2024-246xx/CVE-2024-24698.json) (`2024-02-14T00:15:47.967`) -* [CVE-2024-24699](CVE-2024/CVE-2024-246xx/CVE-2024-24699.json) (`2024-02-14T00:15:48.150`) +* [CVE-2024-23786](CVE-2024/CVE-2024-237xx/CVE-2024-23786.json) (`2024-02-14T10:15:08.727`) +* [CVE-2024-23787](CVE-2024/CVE-2024-237xx/CVE-2024-23787.json) (`2024-02-14T10:15:08.780`) +* [CVE-2024-23788](CVE-2024/CVE-2024-237xx/CVE-2024-23788.json) (`2024-02-14T10:15:08.830`) +* [CVE-2024-23789](CVE-2024/CVE-2024-237xx/CVE-2024-23789.json) (`2024-02-14T11:15:08.200`) +* [CVE-2024-23952](CVE-2024/CVE-2024-239xx/CVE-2024-23952.json) (`2024-02-14T12:15:47.293`) +* [CVE-2024-25207](CVE-2024/CVE-2024-252xx/CVE-2024-25207.json) (`2024-02-14T15:15:08.803`) +* [CVE-2024-25208](CVE-2024/CVE-2024-252xx/CVE-2024-25208.json) (`2024-02-14T15:15:08.863`) +* [CVE-2024-25209](CVE-2024/CVE-2024-252xx/CVE-2024-25209.json) (`2024-02-14T15:15:08.910`) +* [CVE-2024-25210](CVE-2024/CVE-2024-252xx/CVE-2024-25210.json) (`2024-02-14T15:15:08.967`) +* [CVE-2024-25211](CVE-2024/CVE-2024-252xx/CVE-2024-25211.json) (`2024-02-14T15:15:09.013`) +* [CVE-2024-25212](CVE-2024/CVE-2024-252xx/CVE-2024-25212.json) (`2024-02-14T15:15:09.063`) +* [CVE-2024-25213](CVE-2024/CVE-2024-252xx/CVE-2024-25213.json) (`2024-02-14T15:15:09.117`) +* [CVE-2024-25214](CVE-2024/CVE-2024-252xx/CVE-2024-25214.json) (`2024-02-14T15:15:09.167`) +* [CVE-2024-25215](CVE-2024/CVE-2024-252xx/CVE-2024-25215.json) (`2024-02-14T15:15:09.223`) +* [CVE-2024-25216](CVE-2024/CVE-2024-252xx/CVE-2024-25216.json) (`2024-02-14T15:15:09.273`) +* [CVE-2024-25217](CVE-2024/CVE-2024-252xx/CVE-2024-25217.json) (`2024-02-14T15:15:09.323`) +* [CVE-2024-25218](CVE-2024/CVE-2024-252xx/CVE-2024-25218.json) (`2024-02-14T15:15:09.370`) +* [CVE-2024-25219](CVE-2024/CVE-2024-252xx/CVE-2024-25219.json) (`2024-02-14T15:15:09.423`) +* [CVE-2024-25220](CVE-2024/CVE-2024-252xx/CVE-2024-25220.json) (`2024-02-14T15:15:09.477`) +* [CVE-2024-25221](CVE-2024/CVE-2024-252xx/CVE-2024-25221.json) (`2024-02-14T15:15:09.523`) +* [CVE-2024-25222](CVE-2024/CVE-2024-252xx/CVE-2024-25222.json) (`2024-02-14T15:15:09.570`) +* [CVE-2024-25223](CVE-2024/CVE-2024-252xx/CVE-2024-25223.json) (`2024-02-14T15:15:09.627`) +* [CVE-2024-25224](CVE-2024/CVE-2024-252xx/CVE-2024-25224.json) (`2024-02-14T15:15:09.680`) +* [CVE-2024-25225](CVE-2024/CVE-2024-252xx/CVE-2024-25225.json) (`2024-02-14T15:15:09.723`) +* [CVE-2024-25226](CVE-2024/CVE-2024-252xx/CVE-2024-25226.json) (`2024-02-14T15:15:09.767`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `959` -* [CVE-2023-31492](CVE-2023/CVE-2023-314xx/CVE-2023-31492.json) (`2024-02-13T23:15:08.187`) -* [CVE-2023-36486](CVE-2023/CVE-2023-364xx/CVE-2023-36486.json) (`2024-02-14T00:22:06.447`) -* [CVE-2023-36485](CVE-2023/CVE-2023-364xx/CVE-2023-36485.json) (`2024-02-14T00:22:22.397`) -* [CVE-2023-4503](CVE-2023/CVE-2023-45xx/CVE-2023-4503.json) (`2024-02-14T00:27:32.513`) -* [CVE-2024-0684](CVE-2024/CVE-2024-06xx/CVE-2024-0684.json) (`2024-02-14T00:26:13.380`) -* [CVE-2024-25140](CVE-2024/CVE-2024-251xx/CVE-2024-25140.json) (`2024-02-14T00:26:27.847`) -* [CVE-2024-23673](CVE-2024/CVE-2024-236xx/CVE-2024-23673.json) (`2024-02-14T00:26:41.517`) -* [CVE-2024-0690](CVE-2024/CVE-2024-06xx/CVE-2024-0690.json) (`2024-02-14T00:27:00.660`) -* [CVE-2024-0911](CVE-2024/CVE-2024-09xx/CVE-2024-0911.json) (`2024-02-14T00:27:14.370`) -* [CVE-2024-22365](CVE-2024/CVE-2024-223xx/CVE-2024-22365.json) (`2024-02-14T00:27:40.143`) +* [CVE-2024-24142](CVE-2024/CVE-2024-241xx/CVE-2024-24142.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-25118](CVE-2024/CVE-2024-251xx/CVE-2024-25118.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-25119](CVE-2024/CVE-2024-251xx/CVE-2024-25119.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-25120](CVE-2024/CVE-2024-251xx/CVE-2024-25120.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-25121](CVE-2024/CVE-2024-251xx/CVE-2024-25121.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-1485](CVE-2024/CVE-2024-14xx/CVE-2024-1485.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24690](CVE-2024/CVE-2024-246xx/CVE-2024-24690.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24691](CVE-2024/CVE-2024-246xx/CVE-2024-24691.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24695](CVE-2024/CVE-2024-246xx/CVE-2024-24695.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24696](CVE-2024/CVE-2024-246xx/CVE-2024-24696.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24697](CVE-2024/CVE-2024-246xx/CVE-2024-24697.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24698](CVE-2024/CVE-2024-246xx/CVE-2024-24698.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-24699](CVE-2024/CVE-2024-246xx/CVE-2024-24699.json) (`2024-02-14T13:59:35.580`) +* [CVE-2024-23749](CVE-2024/CVE-2024-237xx/CVE-2024-23749.json) (`2024-02-14T13:59:39.353`) +* [CVE-2024-25004](CVE-2024/CVE-2024-250xx/CVE-2024-25004.json) (`2024-02-14T14:02:58.033`) +* [CVE-2024-25003](CVE-2024/CVE-2024-250xx/CVE-2024-25003.json) (`2024-02-14T14:03:25.237`) +* [CVE-2024-20814](CVE-2024/CVE-2024-208xx/CVE-2024-20814.json) (`2024-02-14T14:17:09.033`) +* [CVE-2024-20813](CVE-2024/CVE-2024-208xx/CVE-2024-20813.json) (`2024-02-14T14:18:07.350`) +* [CVE-2024-20815](CVE-2024/CVE-2024-208xx/CVE-2024-20815.json) (`2024-02-14T14:22:16.687`) +* [CVE-2024-20816](CVE-2024/CVE-2024-208xx/CVE-2024-20816.json) (`2024-02-14T14:25:47.030`) +* [CVE-2024-20817](CVE-2024/CVE-2024-208xx/CVE-2024-20817.json) (`2024-02-14T14:42:20.530`) +* [CVE-2024-20818](CVE-2024/CVE-2024-208xx/CVE-2024-20818.json) (`2024-02-14T16:13:49.400`) +* [CVE-2024-20820](CVE-2024/CVE-2024-208xx/CVE-2024-20820.json) (`2024-02-14T16:19:05.800`) +* [CVE-2024-20819](CVE-2024/CVE-2024-208xx/CVE-2024-20819.json) (`2024-02-14T16:20:42.337`) +* [CVE-2024-1209](CVE-2024/CVE-2024-12xx/CVE-2024-1209.json) (`2024-02-14T16:51:40.300`) ## Download and Usage