From 72ca46d0afae38ee0a9d17b9b2604c55e7a28bc7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Tue, 25 Apr 2023 20:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-04-25T18:00:24.065712+00:00 --- CVE-2005/CVE-2005-21xx/CVE-2005-2136.json | 144 ++++++++++++++++++---- README.md | 25 +--- 2 files changed, 129 insertions(+), 40 deletions(-) diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2136.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2136.json index 4107343a1c9..010210a1f8b 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2136.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2136.json @@ -2,7 +2,7 @@ "id": "CVE-2005-2136", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-05T04:00:00.000", - "lastModified": "2008-09-05T20:50:59.007", + "lastModified": "2023-04-25T17:27:31.373", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,13 +44,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-863" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,33 +59,127 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:raritan:dominion:sx4:*:*:*:*:*:*:*", - "matchCriteriaId": "7ADA5D0D-661A-435E-9C04-4901ADE465E7" - }, + "criteria": "cpe:2.3:o:raritan:dominion_sx4_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56D7E942-0970-4BF1-AA34-A1432621F249" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raritan:dominion_sx4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9428BA7E-1ADC-4FC6-9FF3-AD49DBEEF6A0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:raritan:dominion:sx8:*:*:*:*:*:*:*", - "matchCriteriaId": "5D7645A9-A06A-4511-B1AE-EE00D6DA0A5C" - }, + "criteria": "cpe:2.3:o:raritan:dominion_sx8_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D855B42D-26C4-43E9-A438-C11A3E85500D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raritan:dominion_sx8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CE8ABCF-12DC-4124-8326-A097947FEE01" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:raritan:dominion:sx16:*:*:*:*:*:*:*", - "matchCriteriaId": "924C0669-9D61-48CB-97E7-9E0C7EE53267" - }, + "criteria": "cpe:2.3:o:raritan:dominion_sx16_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87C73AE4-DF17-4EB0-B962-D3C7CED2F105" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raritan:dominion_sx16:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B86E9EA-C9BE-4205-9CE7-6E650E6C2546" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:raritan:dominion:sx32:*:*:*:*:*:*:*", - "matchCriteriaId": "75BCC526-FB99-403C-A29C-1FAC8BD6B97B" - }, + "criteria": "cpe:2.3:o:raritan:dominion_sx32_firmware:2.4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6085690F-E5CB-491E-941F-99ABAC22D815" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raritan:dominion_sx32:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00C39BBF-42F3-45B0-B519-5E897682FEBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:raritan:dominion:sx32_2.4.6_firmware:*:*:*:*:*:*:*", - "matchCriteriaId": "9CDAD272-0D80-4CA7-832E-0CD60A8AB5B2" - }, + "criteria": "cpe:2.3:o:raritan:dominion_sxa-48_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DFF290F-B555-4B74-BAA4-ACCB4D08DED7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:h:raritan:dominion:sxa-48:*:*:*:*:*:*:*", - "matchCriteriaId": "3E0ED33C-9D23-47C4-92EC-0C3DD193A229" + "vulnerable": false, + "criteria": "cpe:2.3:h:raritan:dominion_sxa-48:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F1879AB-E397-42EA-8570-7555B0AE1BB5" } ] } @@ -97,13 +192,20 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Mailing List", "Patch", + "Third Party Advisory", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/14084", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index d70a75cce74..d71b7854cc8 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD in 2 hour periods. ### Last repository update ```plain -2023-04-25T16:00:23.432658+00:00 +2023-04-25T18:00:24.065712+00:00 ``` ### Most recent CVE modification timestamp synchronized with NVD ```plain -2023-04-25T15:57:53.957000+00:00 +2023-04-25T17:27:31.373000+00:00 ``` ### Last Data Feed release @@ -29,33 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-datafeeds/r ### Total numbers of included CVEs ```plain -213497 +213505 ``` ### CVEs added in the last commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* CVE-2023-27105 (*2023-04-25T15:15:08.783*) ### CVEs modified in the last commit -Recently modified CVEs: `13` +Recently modified CVEs: `1` -* CVE-2022-42335 (*2023-04-25T15:57:53.957*) -* CVE-2023-2281 (*2023-04-25T15:57:53.957*) -* CVE-2023-25346 (*2023-04-25T15:57:53.957*) -* CVE-2023-25347 (*2023-04-25T15:57:53.957*) -* CVE-2023-25348 (*2023-04-25T15:57:53.957*) -* CVE-2023-26057 (*2023-04-25T15:57:53.957*) -* CVE-2023-26058 (*2023-04-25T15:57:53.957*) -* CVE-2023-26839 (*2023-04-25T15:57:53.957*) -* CVE-2023-26840 (*2023-04-25T15:57:53.957*) -* CVE-2023-26841 (*2023-04-25T15:57:53.957*) -* CVE-2023-26843 (*2023-04-25T15:57:53.957*) -* CVE-2023-29779 (*2023-04-25T15:57:53.957*) -* CVE-2023-30417 (*2023-04-25T15:57:53.957*) +* CVE-2005-2136 (*2023-04-25T17:27:31.373*) ## Download and Usage