Auto-Update: 2023-05-16T12:00:25.432193+00:00

This commit is contained in:
René Helmke 2023-05-16 14:00:28 +02:00
parent ee3c699d3d
commit 8a572bc01d
118 changed files with 3178 additions and 621 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-0897",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-11-15T05:00:00.000",
"lastModified": "2016-10-18T02:12:56.730",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:09:02.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -58,9 +58,553 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.47e",
"matchCriteriaId": "CB3A00E1-8302-4B4C-9BA3-72BBE5BED240"
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9273BCD-A439-426F-AA8C-7194B9A993F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC26B64-FC02-45F2-A263-9E011945A3E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "08AB5674-453A-433A-8219-35F456611461"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "EC6486FB-B5F8-4DDA-B42B-98A07C7BE14F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "A23809E5-50FB-4CF0-A72D-EBF37C01781F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "AB495093-00E6-4C1F-B544-9D2D965F0E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "127135A5-A776-424C-B5F1-9BC3238CF213"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FAFE51-8E79-453E-870D-B369EE29D36A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87C217B8-5732-430F-ACD6-99CF2B2027D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "474CF5E7-4C77-473B-950B-7B1FC399725C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "326C13A5-F302-418C-85E1-C333325E229E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "88C02339-7393-46D7-9DA4-3228DF837582"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DA8097F7-5A17-40E7-8CD2-231291253BA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2A28920A-EF18-4160-9DC1-0DC7D1CFD61E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1382D86F-0A84-46B6-B5E7-E9ED3FBFB57C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A80A0BE7-A823-4AC1-9B84-2D7F910FA16E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0055FF-C2E8-443A-B567-23ED37A3F95B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAD48EC-5B61-4EC8-A128-3E6C59FF2EB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.01:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAAB97D-7381-4447-B8E4-EB7EFD27547C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CD2691-F351-4D11-8EFC-8F86EB6A6B68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.03:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0CED1F-7C87-4156-8466-C4CB67839072"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.04:*:*:*:*:*:*:*",
"matchCriteriaId": "16ECB78B-36C6-49FE-AC76-5F3C49989422"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.05:*:*:*:*:*:*:*",
"matchCriteriaId": "E529724F-68AB-4BC9-90E9-1719A67C7972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.06:*:*:*:*:*:*:*",
"matchCriteriaId": "553AD514-8315-4A53-A985-CADDFCDD2F95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.07:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3C3B5B-2EEA-466C-9944-A11370AAA446"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "591E5018-66DF-4F8B-8EE9-2459C9142BC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1D3E9916-DCF8-47E9-8C1D-571D9423178E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.52:*:*:*:*:*:*:*",
"matchCriteriaId": "96C0DEAA-F0F7-4E98-A901-49D8B6B8C35B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E36013-DFB5-4D6B-B933-653E00B1AD4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.75:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E8CE07-A4BD-4E61-88CD-8E72AE0A3577"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.80:*:*:*:*:*:*:*",
"matchCriteriaId": "E19C4427-ABF7-47B0-8C18-9A9D7E093BB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.81:*:*:*:*:*:*:*",
"matchCriteriaId": "E779CE38-A887-4484-A319-AE177A2FC33C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.82:*:*:*:*:*:*:*",
"matchCriteriaId": "296780D8-88A9-4B4E-98BA-138CB702D846"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.83:*:*:*:*:*:*:*",
"matchCriteriaId": "BABCB8BB-89B8-4711-9CEE-069DBCB372C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.84:*:*:*:*:*:*:*",
"matchCriteriaId": "E255B370-054C-4BED-A00D-FD088BEE9B9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.85:*:*:*:*:*:*:*",
"matchCriteriaId": "6F99A2D1-E071-4E99-AD0F-DAEA5A57CA31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.86:*:*:*:*:*:*:*",
"matchCriteriaId": "06743824-C01A-44A1-A75A-36F0719D83BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.00:*:*:*:*:*:*:*",
"matchCriteriaId": "85540AB5-815E-4B1E-912C-07B8F7A2112C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.01:*:*:*:*:*:*:*",
"matchCriteriaId": "48E6BB74-AEF9-4B8E-967F-1867969994FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.02:*:*:*:*:*:*:*",
"matchCriteriaId": "7F219F48-41A2-4373-AD6F-B86C7194DC31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:-:*:*:*:*:*:*",
"matchCriteriaId": "064000B6-2B45-48F9-ACE7-96D4A872C37B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:a:*:*:*:*:*:*",
"matchCriteriaId": "AB6C89B1-FA6F-4578-881F-A0990E6F5013"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:-:*:*:*:*:*:*",
"matchCriteriaId": "2ABD4153-05AA-4BD3-8667-A59D0A9F90DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:a:*:*:*:*:*:*",
"matchCriteriaId": "B684B4A5-3BAB-43DD-9BC7-034BAD426784"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*",
"matchCriteriaId": "0C52CA83-3B52-4C87-92B1-E45424A2556B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.08:*:*:*:*:*:*:*",
"matchCriteriaId": "24356CBC-CACF-49B4-8063-6060801205D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.09:*:*:*:*:*:*:*",
"matchCriteriaId": "34855C05-1FFD-436C-87AB-EC5344D229E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A530F3D9-0872-40C3-B2E2-052DAD2C5268"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CEDA5D94-8E1C-4F3B-B09B-3B5BFFA6B801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "68B5870D-53AD-4F13-8AAA-85DD277857B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "9FB03DE5-A890-4D4A-A436-66AC29C10EF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "358BA26A-5F81-4C33-BA46-BFAD09DAB74D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "79C09870-2EB7-4648-A015-C615911D5DF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDF474B-BF27-44D8-857B-772EF651A7B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "4ABFDB1B-2A64-4AB9-AAD5-8E81EDC5F0A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3EE5A2-C82A-427A-88CF-CED24440550A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC496C6-F120-49B9-A852-9F692D5EDA34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "5AEF11EA-F515-4F75-BCA5-C1632FBA8B55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5BEA29-DE63-4B0D-A037-96109930BDD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "9B14FEA3-C2F2-4690-8EF3-07978A29C452"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "C4304FE2-84DE-452E-91B1-0E12C9AB8B09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "18C97E41-6A7F-41EF-8801-BBEDCD5F88F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:-:*:*:*:*:*:*",
"matchCriteriaId": "B7E3A8D6-F692-4316-ABA8-DC431B47AD36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:a:*:*:*:*:*:*",
"matchCriteriaId": "4B6F88B0-A4B6-4EC1-A29D-FA99CFC711EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:b:*:*:*:*:*:*",
"matchCriteriaId": "C9C5D600-EC5B-4D62-B21A-962DED1F31CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:-:*:*:*:*:*:*",
"matchCriteriaId": "07C71232-9C46-4034-84CD-63F9A44D1EFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:a:*:*:*:*:*:*",
"matchCriteriaId": "04CDE5BC-A8F8-43A4-B716-DAA918F241DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "51F72F6D-F8B2-41AD-ABA1-15205D3CF0C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "0B50B140-28FB-442E-A998-C791C4B554A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "671C1290-9C59-4822-AEC6-04143B770BC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:-:*:*:*:*:*:*",
"matchCriteriaId": "C8ADD31B-C5A8-4299-B9C4-7577F7EC4378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:a:*:*:*:*:*:*",
"matchCriteriaId": "E9BCCE31-C166-49A7-972D-527AB89AEFCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2FFC74-4F52-4549-8B3C-FD83364F6B5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:-:*:*:*:*:*:*",
"matchCriteriaId": "C9D6A017-E229-445C-A4A1-07E8DBA8FDE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:a:*:*:*:*:*:*",
"matchCriteriaId": "A0E39F77-08F8-4939-89F9-88B5FC254A4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.37:*:*:*:*:*:*:*",
"matchCriteriaId": "729977A6-7E1D-409F-B74F-21FCB469A265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:-:*:*:*:*:*:*",
"matchCriteriaId": "5009EDAC-EE9E-49F2-B717-3AD12D675A58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:a:*:*:*:*:*:*",
"matchCriteriaId": "FA861D32-8E30-41ED-93D7-54BA46B96429"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:b:*:*:*:*:*:*",
"matchCriteriaId": "D69D4949-926A-4209-9769-C91F390AE931"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:c:*:*:*:*:*:*",
"matchCriteriaId": "F366C2A8-2396-4ADA-98A2-2C727F6BB2F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:d:*:*:*:*:*:*",
"matchCriteriaId": "B3B9B13E-98BC-4B2F-A46E-2EF2A4C51A4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:-:*:*:*:*:*:*",
"matchCriteriaId": "99EBE73C-CF78-4123-B5BC-A719B0317CB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:a:*:*:*:*:*:*",
"matchCriteriaId": "2A7202ED-8BA1-40B4-A8EF-CB638FEF8FB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:b:*:*:*:*:*:*",
"matchCriteriaId": "5C15A0BE-87B3-4D3C-B9A5-5731661D8577"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:c:*:*:*:*:*:*",
"matchCriteriaId": "3E701F44-F1AA-4BB9-A2BB-A89CA82E54C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.40:*:*:*:*:*:*:*",
"matchCriteriaId": "39018D43-F8A4-49F4-90BC-464648DB55C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:-:*:*:*:*:*:*",
"matchCriteriaId": "81224635-60DF-4C4F-9ABF-3FBCDE769C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:a:*:*:*:*:*:*",
"matchCriteriaId": "6954C7A9-4AE4-4374-AD35-C78ABAD6D13F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:b:*:*:*:*:*:*",
"matchCriteriaId": "337E61B7-4A9B-42A8-8C8D-E8A8644A599E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:-:*:*:*:*:*:*",
"matchCriteriaId": "6F4A2A10-E274-4DAB-83ED-5603FA4A1744"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:a:*:*:*:*:*:*",
"matchCriteriaId": "036C0212-3ABE-4435-897F-5ADD4EA47F4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:-:*:*:*:*:*:*",
"matchCriteriaId": "76FBE583-898B-4EA3-9406-D01B0C6D2E84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:a:*:*:*:*:*:*",
"matchCriteriaId": "53598A0B-F14C-43B6-B554-73910DD4D6BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:b:*:*:*:*:*:*",
"matchCriteriaId": "5641CF25-DE69-4412-A930-E844641E54B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:c:*:*:*:*:*:*",
"matchCriteriaId": "EA38A770-062D-4987-871C-BF12D2415473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:d:*:*:*:*:*:*",
"matchCriteriaId": "F7044A6E-347A-44E9-9EB6-BEF0D6191B75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:-:*:*:*:*:*:*",
"matchCriteriaId": "7FE4CFA8-FE00-4D82-99FB-154763BC7B3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:a:*:*:*:*:*:*",
"matchCriteriaId": "D3F14DF9-3ACE-4117-9AF3-AFB75B6F6C0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:b:*:*:*:*:*:*",
"matchCriteriaId": "BCAF1620-D289-419D-8DC9-2237BFF3D9DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:-:*:*:*:*:*:*",
"matchCriteriaId": "1867E969-B4BB-4F30-9435-03E3311D453C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:a:*:*:*:*:*:*",
"matchCriteriaId": "06300271-726B-4725-ABCD-6F7F0D1D9163"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:b:*:*:*:*:*:*",
"matchCriteriaId": "8CAABC7E-ADAB-4234-AC09-3A269830D50F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:c:*:*:*:*:*:*",
"matchCriteriaId": "2E7C092C-2B1A-4D95-89F4-3C752DE0F542"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:-:*:*:*:*:*:*",
"matchCriteriaId": "954827B7-14BA-470F-A40A-2EF3B5818314"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:a:*:*:*:*:*:*",
"matchCriteriaId": "11E88097-2945-4046-83B0-93C11B995400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:-:*:*:*:*:*:*",
"matchCriteriaId": "F974F8FB-A8EB-41CF-A370-B4743F56CA66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:a:*:*:*:*:*:*",
"matchCriteriaId": "C8C476D5-BE6B-4292-B358-8565E940459D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:b:*:*:*:*:*:*",
"matchCriteriaId": "BF77674A-01AD-456B-B17E-2DFCA43319C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:c:*:*:*:*:*:*",
"matchCriteriaId": "34E0C561-2F6E-474B-BCFE-15B24A2657C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:d:*:*:*:*:*:*",
"matchCriteriaId": "FA9C9EA8-140A-49F7-BF57-82CABB733D4D"
}
]
}
@ -70,11 +614,17 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=100586033530341&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=100586541317940&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-9777",
"sourceIdentifier": "secalert@redhat.com",
"published": "2016-12-28T07:59:00.510",
"lastModified": "2016-12-31T02:59:40.157",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:09:07.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.8.11",
"matchCriteriaId": "00B2C5A0-53C6-4A5A-A79A-9A213FA01EE5"
"versionStartIncluding": "4.8",
"versionEndExcluding": "4.8.12",
"matchCriteriaId": "DC8CAAEA-FB80-41CC-BECF-346FCF47EFF1"
}
]
}
@ -119,7 +120,11 @@
},
{
"url": "http://www.securityfocus.com/bid/94640",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400804",

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-7548",
"sourceIdentifier": "secalert@redhat.com",
"published": "2017-08-16T18:29:00.287",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:09:13.220",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -94,68 +94,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "77D1323D-3096-4D0F-823A-ECAC9017646D"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4",
"versionEndExcluding": "9.4.13",
"matchCriteriaId": "E370B696-649E-48B8-A358-7544057FC82E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A587AF3-5E70-4455-8621-DFD048207DE2"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.5",
"versionEndExcluding": "9.5.8",
"matchCriteriaId": "1EC050F6-E045-4605-8739-32D657632606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "526AFF26-B3EC-41C3-AC4C-85BFA3F99AC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "89D2CAB7-C3D9-4F21-B902-2E498D00EFEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "88797795-8B1C-455F-8C52-6169B2E47D53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DBDE0CC8-F1DF-4723-8FCB-9A33EA8B12D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "90F13667-019B-49DF-929C-3D376FCDE6E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E20AA3-C0D3-492C-AF3B-9F61550E6983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "251C78CA-EEC0-49A8-A3D2-3C86D16CCB7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AB443A75-2466-4164-A71B-9203933CB0D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B02839D4-EE7D-4D42-8934-322E46B643D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B1BAE807-A21F-4980-B64E-911F5E9B16BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "46ED9A2E-8169-4470-AE61-54829B11BDAB"
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.6",
"versionEndExcluding": "9.6.4",
"matchCriteriaId": "D5F2A1D5-D7F7-4216-9B28-E7A32DFE0A78"
}
]
}
@ -169,73 +125,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF7FC5B-C9E3-4109-B3D6-9AC06F75DCB3"
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.1.:*:*:*:*:*:*:*",
"matchCriteriaId": "F2DF5BA0-6D8E-416E-B441-1A2D8624FD54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF74623-EF0E-455D-ADEB-9E336B539D86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FACD7AB7-34E9-4DFC-A788-7B9BF745D780"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E8AEBB-9968-458D-8EE4-2725BBE1A53F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECC17E6-C5FF-4B63-807A-26E5E6932C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7DB72357-B16D-488A-995C-2703CCEC1D8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B9671475-BC67-436F-B2B1-5128347B3C64"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7040466B-2A7D-4E75-8E4F-FA70D4A7E014"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44887DE9-506B-46E3-922C-7B3C14B0AF33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1250F15-7A05-452A-8958-3B1B32B326E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A18FEF31-B528-46A8-AAA8-63B30D5A10EC"
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
}
]
}
@ -245,11 +141,17 @@
"references": [
{
"url": "http://www.debian.org/security/2017/dsa-3935",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2017/dsa-3936",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/100276",
@ -269,15 +171,24 @@
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2677",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2017:2678",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/201710-06",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.postgresql.org/about/news/1772/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-16872",
"sourceIdentifier": "secalert@redhat.com",
"published": "2018-12-13T21:29:00.260",
"lastModified": "2023-02-12T23:32:31.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:48:42.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -246,11 +246,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/bugtraq/2019/May/76",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-16884",
"sourceIdentifier": "secalert@redhat.com",
"published": "2018-12-18T22:29:04.713",
"lastModified": "2023-02-13T04:52:34.713",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T10:49:27.070",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
}
],
"cvssMetricV30": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -114,8 +116,45 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7",
"versionEndExcluding": "3.16.65",
"matchCriteriaId": "BF7B0E80-3E3F-4B73-AC57-4D6989EF9805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.19.133",
"matchCriteriaId": "BC4A8868-C1A2-4426-8ADC-36ADEEFA54B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.151",
"matchCriteriaId": "C6FA30C2-06D9-4FC0-A64A-4D30FBF34810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.94",
"matchCriteriaId": "2AF1D6FF-6D18-4CEB-B3A5-21FCF8A36055"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.16",
"matchCriteriaId": "CD130255-0E04-4A26-94E8-CF4C39A962B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "4.20.3",
"matchCriteriaId": "FB066CC3-3C28-424B-A71C-352F4947F7FB"
}
]
}
@ -188,31 +227,52 @@
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:1873",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:1891",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2696",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:2730",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3309",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3517",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0204",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884",
@ -286,23 +346,38 @@
},
{
"url": "https://usn.ubuntu.com/3980-1/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3980-2/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3981-1/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/3981-2/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-18559",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-10-22T16:29:00.360",
"lastModified": "2019-05-14T23:29:07.497",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:14:50.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -89,8 +89,58 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.19",
"matchCriteriaId": "AF8125D1-648B-4421-B0FC-089A20CBB248"
"versionStartIncluding": "3.2.95",
"versionEndExcluding": "3.2.100",
"matchCriteriaId": "0CA0EF67-DAA8-439C-88DA-06F8CED463BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.14.58",
"versionEndExcluding": "3.15",
"matchCriteriaId": "2AF75D2A-CD18-4268-B498-BF26EF757A28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.18.25",
"versionEndExcluding": "3.18.88",
"matchCriteriaId": "AF5005A4-042F-4BA0-8BB9-FBC748AAA337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.14",
"versionEndExcluding": "4.1.49",
"matchCriteriaId": "C3CB4132-667D-46CF-91D0-5F4E8F686F9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.7",
"versionEndExcluding": "4.3",
"matchCriteriaId": "9A1E09B0-F11F-4A94-BF71-6A4FF66A7A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.1",
"versionEndExcluding": "4.4.106",
"matchCriteriaId": "9431D0C6-E29C-42D5-A3C3-B70B23A6A240"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.70",
"matchCriteriaId": "C1EB15B3-5BB0-46B9-9F22-B39D1F6DAFED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.7",
"matchCriteriaId": "F8509BD8-B51C-4F0D-A278-08E03E83B254"
}
]
}
@ -171,23 +221,38 @@
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:1170",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:1190",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:3967",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2019:4159",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2020:0174",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://blogs.securiteam.com/index.php/archives/3731",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3864",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-09-20T15:29:00.663",
"lastModified": "2022-04-19T18:15:18.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:14:43.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -90,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-120"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3866",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-23T22:29:00.370",
"lastModified": "2022-04-19T18:15:18.353",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:12:16.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -90,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3903",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-23T15:29:01.210",
"lastModified": "2022-04-19T18:15:21.140",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:09:30.940",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -90,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3904",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-27T15:29:01.027",
"lastModified": "2022-04-19T18:15:21.207",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:13:40.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -90,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3905",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-23T15:29:01.333",
"lastModified": "2022-04-19T18:15:21.273",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:10:27.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3907",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-24T00:29:00.210",
"lastModified": "2022-04-19T18:15:21.410",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:13:15.893",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -29,13 +29,15 @@
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
"impactScore": 5.8
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3916",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-28T20:29:00.873",
"lastModified": "2022-04-19T18:15:22.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:14:32.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3918",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2018-08-27T15:29:01.137",
"lastModified": "2022-04-19T18:15:22.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:13:47.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -35,7 +35,9 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
}
],
"cvssMetricV30": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-6974",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-02-15T15:29:00.250",
"lastModified": "2022-04-05T20:40:44.977",
"lastModified": "2023-05-16T11:14:56.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -89,8 +89,51 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10",
"versionEndExcluding": "3.16.64",
"matchCriteriaId": "93BC7269-F57C-4804-9143-0C81DAE4E50E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "3.18.136",
"matchCriteriaId": "63E05151-6508-41BE-89E8-7D43ACC0DBCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.4.176",
"matchCriteriaId": "C6769A3C-ABE7-412B-B0BA-A5D9CC063683"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.156",
"matchCriteriaId": "A293D608-B6FE-4E0A-92C4-FE04DD5D3FB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.99",
"matchCriteriaId": "F48AF79A-FA29-4687-B78E-4EABA7F5223B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.21",
"matchCriteriaId": "17817ACA-7271-47C1-B371-DA15D00516EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "4.20.8",
"matchCriteriaId": "4DF2BBFB-2F62-45DF-9473-3D4451ECDD99"
"matchCriteriaId": "D24491DB-D4DD-4719-B553-28E8508833A4"
}
]
}
@ -488,7 +531,9 @@
"url": "http://www.securityfocus.com/bid/107127",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7225",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-06-27T17:15:15.770",
"lastModified": "2019-10-09T23:51:57.357",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:15:00.720",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-9012",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-15T18:15:23.477",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:15:49.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -160,7 +160,10 @@
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12938&token=b9eb30f53246dc57b2e7cb302356a05547148fa2&download=",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-03",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-9013",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-15T17:15:13.660",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:15:45.683",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -174,7 +174,10 @@
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download=",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-15777",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-08-25T22:15:11.473",
"lastModified": "2020-11-09T22:15:12.960",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:53:55.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -96,11 +96,18 @@
"references": [
{
"url": "https://docs.gradle.com/enterprise/maven-extension/#1_6",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://security.gradle.com/advisory/CVE-2020-15777",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-25643",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-10-06T14:15:12.683",
"lastModified": "2022-10-25T16:55:22.367",
"lastModified": "2023-05-16T10:48:49.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,8 +96,44 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.8.13",
"matchCriteriaId": "CB3FD8E8-06B6-4E73-9337-49E751C7FD04"
"versionStartIncluding": "2.6.29",
"versionEndExcluding": "4.4.238",
"matchCriteriaId": "E9E5CC7A-87CD-4454-A66C-72D0F92361C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.238",
"matchCriteriaId": "878A4477-4934-49C5-B2FA-BB98D5B2E8E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.200",
"matchCriteriaId": "28ACEA44-E1D1-4760-A4A5-5FE0A7EFA070"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.148",
"matchCriteriaId": "FBFAFB7B-8C46-465B-A829-55658AE4D00F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.68",
"matchCriteriaId": "9564CB60-DC32-450D-99F9-8CA6E070B049"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.8.12",
"matchCriteriaId": "5DFE9299-F6DC-440B-BC12-72FBAF4A02E9"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-27784",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-09-01T18:15:08.467",
"lastModified": "2023-03-03T18:40:00.033",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:51:13.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,8 +70,44 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10",
"matchCriteriaId": "D61CA62B-157A-4415-B8FD-7C3C1208315D"
"versionStartIncluding": "4.1",
"versionEndExcluding": "4.4.241",
"matchCriteriaId": "6562CC02-020B-4BA1-8B62-116EE3BF3D8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.241",
"matchCriteriaId": "72EFD2ED-12E4-4AFD-B5BB-CB3293750BFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.19.154",
"matchCriteriaId": "B952E0D7-4D70-4BBE-A15B-3435430BA7EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.73",
"matchCriteriaId": "647A7A2A-7AB0-4CD3-A6C8-4D3F52721743"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.8.17",
"matchCriteriaId": "ECB8F088-C63B-40C8-B27B-86F62F62C3E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9.0",
"versionEndExcluding": "5.9.2",
"matchCriteriaId": "FA66D250-BE2A-4F96-B53E-CFBECEF46D83"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-27786",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-12-11T05:15:12.263",
"lastModified": "2023-02-02T22:23:06.977",
"lastModified": "2023-05-16T10:49:08.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,8 +84,44 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*",
"matchCriteriaId": "F1AB4A11-C03C-4ABB-B596-0EB3B0F1A8DF"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.224",
"matchCriteriaId": "C371AE92-D5FD-45E1-91D6-0EE05FA6D21C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.224",
"matchCriteriaId": "AA91BF70-8648-4C4E-B605-538BF8A2FC27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.181",
"matchCriteriaId": "06E32062-F304-482F-AF76-B675892181D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.124",
"matchCriteriaId": "16360395-8BB9-4929-ABD9-D4EEC5DF1F8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.42",
"matchCriteriaId": "514407C3-9A5E-4685-88D0-F8106DA8361E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.6.14",
"matchCriteriaId": "FA9116AC-779C-4BE7-92D1-757CC91A2355"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-0877",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:10.163",
"lastModified": "2023-05-15T22:15:10.163",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-22600",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-01-26T14:15:08.123",
"lastModified": "2023-02-02T16:14:45.667",
"lastModified": "2023-05-16T10:47:38.063",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-04-11",
"cisaActionDue": "2022-05-02",
@ -120,52 +120,37 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.175",
"versionEndExcluding": "4.14.259",
"matchCriteriaId": "A5D643C3-1A06-488D-9837-CE4011D7A22D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.114",
"versionEndExcluding": "4.19.222",
"matchCriteriaId": "7A938BE1-F655-40D2-9CD3-A00308B35DEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.29",
"versionEndExcluding": "5.4.168",
"matchCriteriaId": "B6C785C7-EEE2-4E48-A03B-86DF3D2449B1"
"matchCriteriaId": "FEADDB96-5D2F-463E-94A1-DB604CB44C44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionStartIncluding": "5.5.14",
"versionEndExcluding": "5.10.88",
"matchCriteriaId": "EB4181F8-6C8B-4641-A13A-D558F76ABA69"
"matchCriteriaId": "9FADFAA6-11EF-467D-B365-2E2D18304156"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.11",
"matchCriteriaId": "7A70FD7B-2EDC-4C3B-ADE0-880AA759CDD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*",
"matchCriteriaId": "FF588A58-013F-4DBF-A3AB-70EC054B1892"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
"matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-25220",
"sourceIdentifier": "security-officer@isc.org",
"published": "2022-03-23T13:15:07.680",
"lastModified": "2022-11-28T18:14:39.543",
"lastModified": "2023-05-16T10:59:43.300",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -410,6 +410,719 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.3",
"matchCriteriaId": "ECFE39BF-15FB-4129-9D8C-4F28DABB5D83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"matchCriteriaId": "59006503-B2CA-4F79-AC13-7C5615A74CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "11B5CC5A-1959-4113-BFCF-E4BA63D918C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "AF24ACBD-5F84-47B2-BFF3-E9A56666269C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "3935A586-41BD-4FA5-9596-DED6F0864777"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "B83FB539-BD7C-4BEE-9022-098F73902F38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"matchCriteriaId": "7659AC36-A5EA-468A-9793-C1EC914D36F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"matchCriteriaId": "E0E018E1-568E-40F2-ADA5-F71509811879"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"matchCriteriaId": "122B09A3-299A-421C-9A6B-B3FEED8E19FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*",
"matchCriteriaId": "55F3E730-83F2-43C2-B6DC-77BAABB2F01D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "B9295AF3-A883-47C3-BAF8-3D82F719733E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "F09D3262-394A-43D1-A4ED-8887FCB20F87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "D3FEA876-302D-4F07-94E6-237C669538F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "B011854A-932C-4D5C-B469-71F72608DFCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "94A44054-B47B-453C-BF0F-9E071EFF6542"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "CA3A4806-59AB-43D6-BFE3-A6DCE098335C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
"matchCriteriaId": "45DA4D89-1362-421F-8218-585CE5D60E81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9B342307-98CF-45C9-9F08-5EB06C679B79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "DC743EE4-8833-452A-94DB-655BF139F883"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "FE96A8EA-FFE3-4D8F-9266-21899149D634"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "C12A75C6-2D00-4202-B861-00FF71585FA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"matchCriteriaId": "70FF3DD4-14CB-435D-8529-0480EB853F60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"matchCriteriaId": "84429093-AB3C-4C05-B8FA-87D94091820F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "4DCFA774-96EF-4018-82CF-95C807025C24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "76022948-4B07-43CB-824C-44E1AB3537CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "25446F60-5CB9-4923-BCE8-609AE3CFDFBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"matchCriteriaId": "760E2418-B945-4467-BDAC-7702DDF4C4EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"matchCriteriaId": "98097AB6-56CB-42E4-96B4-ABBD4F36553C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
"matchCriteriaId": "7844B380-7986-4B71-B1AE-22D46E5007D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
"matchCriteriaId": "7EF24AFC-D359-4132-A133-1F6680F7BE46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "758275F3-9457-45A2-8F57-65DCD659FC1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "B46CB928-78B5-4D60-B747-9A0988C7060D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "0886EFA6-47E3-4C1D-A278-D3891A487FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "A209EE6F-E676-4172-8FF3-4E03748DEB13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
"matchCriteriaId": "EC395200-9A69-468A-8461-D2219B34AA0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
"matchCriteriaId": "08584FCD-4593-4590-A988-C862295E618A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
"matchCriteriaId": "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
"matchCriteriaId": "E69B0ED4-898D-4D7A-9711-8DB00EE3197B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"matchCriteriaId": "D4CF52CF-F911-4615-9171-42F84429149F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "18DB9401-5A51-4BB3-AC2F-58F58F1C788C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"matchCriteriaId": "06F53DA5-59AE-403C-9B1E-41CE267D8BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "3332262F-81DA-4D78-99C9-514CADA46611"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "B46B63A2-1518-4A29-940C-F05624C9658D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "8E0D4959-3865-42A7-98CD-1103EBD84528"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"matchCriteriaId": "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "681AE183-7183-46E7-82EA-28C398FA1C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "0A80F23B-CD13-4745-BA92-67C23B297A18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "67D4004B-1233-4258-9C7A-F05189146B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "69E33F24-D480-4B5F-956D-D435A551CBE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
"matchCriteriaId": "03009CC1-21AC-4A46-A747-D0C67FCD41DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "5C9BC697-C7C9-447D-9EBD-E9711462583E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "7B80433B-57B1-49EF-B1A1-83781D6102E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "A352BB7A-6F17-4E64-BC02-1A7E4CD42653"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "05D8427C-CDDE-4B2F-9CB8-41B9137660E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "F3DC01F2-6DFE-4A8E-9962-5E59AA965935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "7DA0E196-925E-4056-B411-E158702D5D4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "E33A522F-E35C-4473-9CBD-9C6E5A831086"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "E9AE26EB-699B-4B10-87E2-9E731B820F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "A29E0070-47E9-43DD-9303-C732FE8CC851"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E"
}
]
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31888",
"sourceIdentifier": "productcert@siemens.com",
"published": "2021-11-09T12:15:09.640",
"lastModified": "2022-05-20T13:15:13.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:50:54.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -93,11 +93,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:capital_vstar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC45D63-0FB7-4995-AF45-B41F6EF6A9E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*",
@ -106,8 +101,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2017.02.1",
"matchCriteriaId": "769372D0-68B3-47F3-B13B-43EAAF7E822D"
"versionEndExcluding": "2017.02.4",
"matchCriteriaId": "C2F36C9F-E4F4-4678-B82D-361F4818B66C"
},
{
"vulnerable": true,
@ -181,8 +176,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "105A6FFB-1176-4021-868D-3D6CE77113B2"
"criteria": "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:p2_ethernet:*:*:*",
"versionEndExcluding": "2.8.19",
"matchCriteriaId": "DB03E262-4378-4E0F-9263-19D1392CCC8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:bacnet:*:*:*",
"versionEndExcluding": "3.5.4",
"matchCriteriaId": "C7F539A7-092A-452D-AAEF-A18CAB76EF39"
}
]
},
@ -208,8 +210,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BE40AF-B7A4-498A-943E-11AA9393A3D6"
"criteria": "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:p2_ethernet:*:*:*",
"versionEndExcluding": "2.8.19",
"matchCriteriaId": "32FAA115-303A-43BF-BB07-153269A82769"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:bacnet:*:*:*",
"versionEndExcluding": "3.5.4",
"matchCriteriaId": "AD5099CC-0908-4CB8-A152-869B1678F484"
}
]
},
@ -236,7 +245,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:talon_tc_compact_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CA14719-C655-4BED-AE8D-B9C983847AE4"
"versionEndExcluding": "3.5.4",
"matchCriteriaId": "46B9BC93-293E-4D1F-BA10-4E79DCF472FB"
}
]
},
@ -263,7 +273,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:talon_tc_modular_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3470FD-BEBE-465F-A189-F4CEDD0F6815"
"versionEndExcluding": "3.5.4",
"matchCriteriaId": "90E02740-938E-421A-97F9-DAC9A96F048B"
}
]
},
@ -289,8 +300,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60FAD4D8-54FA-4721-954E-4AD77020B189"
"criteria": "cpe:2.3:o:siemens:desigo_pxc00-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "7F55E48E-BFB9-436A-9586-696D910C0122"
}
]
},
@ -300,8 +313,356 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F978E7-3DD9-4948-BFFB-E7273003477B"
"criteria": "cpe:2.3:h:siemens:desigo_pxc00-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1727849-2FD8-40A2-91D3-E0C9662B45BC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc00-u_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "9B62759D-843B-48FC-82CB-1A8562C6BAFD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc00-u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD39D011-8AE2-46FE-9207-C110E2FBC07C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc001-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "A9FA1D60-CB76-4F9F-AF50-F044938E24F7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc001-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCC50C13-FA05-4459-BA1E-482D886B842B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc12-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "E759F7F2-A0EA-4A93-9BE7-56754F3DB71E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc12-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDA404C0-FD6D-47CC-950C-E5DCC993C8E6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc22-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "06588CEC-2291-4870-84D9-6A61614D954F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc22-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A4D84CE-07AB-4305-9C48-54392772D4EB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc22.1-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "43E08A74-3DAF-4022-9FF2-9ADA4426161E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc22.1-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E67F374-BF75-4334-A6D5-AB570E0A70D8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc36.1-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "875BF593-DC7B-4416-983D-E69C48F5F3EF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc36.1-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA7EF94-2EE2-4B53-A544-F675306DF84F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc50-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "60970078-7799-458D-983C-AD012FFA4241"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc50-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B73C4D39-A600-460B-A9A4-A954A58EDB17"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc64-u_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "30E702A4-7D43-4277-9885-52AA26EB526B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc64-u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88DBB445-0A82-4DE8-B2CB-0CDD06A7E413"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc100-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "4D3E8389-DC09-4E20-9406-8AACE31E4503"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc100-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EC2CE6-D918-4D78-A135-34E25C82E40B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc128-u_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "C5E933BA-6FBA-445C-AC3E-F866E606A34D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc128-u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E1693F-D78F-4AC1-9304-3A5D64F5AEE2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxc200-e.d_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "182DB746-FDA5-4856-BE6C-C84E0EFF7BFC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxc200-e.d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A602EDAE-72D4-4546-8C41-BBBECE2FD328"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:desigo_pxm20-e_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "6.30.016",
"matchCriteriaId": "7A58E17E-5986-4EEF-93BF-0596AA1E7F46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:desigo_pxm20-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D7DD189-AEC3-4CB8-9337-876B8C8F2322"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33621",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-18T23:15:18.987",
"lastModified": "2023-01-12T19:38:03.190",
"lastModified": "2023-05-16T11:02:59.923",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -101,6 +101,37 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.7.0",
"versionEndExcluding": "2.7.7",
"matchCriteriaId": "3553CC40-CE13-48A8-B959-0C0B96F1FAD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.5",
"matchCriteriaId": "3047B1E3-1CB1-4270-AB66-CF194AECB87E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.3",
"matchCriteriaId": "576D85B3-8EA3-42F8-89FE-316057C9971D"
}
]
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-35039",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-07-07T01:15:07.517",
"lastModified": "2021-12-06T17:03:19.833",
"lastModified": "2023-05-16T10:59:26.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -86,8 +86,29 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.196",
"matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.129",
"matchCriteriaId": "3BA224A1-00EE-4171-B259-921A4A3E2A26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.47",
"matchCriteriaId": "7E7C0CCD-69D3-4E4B-A278-9DA1DC6464ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.12.14",
"matchCriteriaId": "EC1030E9-F8FE-4F40-88D4-7CD501054679"
"matchCriteriaId": "AE921D8E-1E68-4B26-B8BB-2C48BF1BE23C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3653",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-09-29T20:15:08.617",
"lastModified": "2022-03-31T19:45:45.900",
"lastModified": "2023-05-16T10:49:00.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,13 +96,50 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.30",
"versionEndExcluding": "5.14",
"matchCriteriaId": "6744C838-9E4F-41D0-AC28-6CD84B04F6A2"
"versionEndExcluding": "4.4.282",
"matchCriteriaId": "6C604847-F398-40D1-AB26-04FAED3AF5D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*",
"matchCriteriaId": "6A05198E-F8FA-4517-8D0E-8C95066AED38"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.281",
"matchCriteriaId": "286C2303-8862-4B89-BF52-0EB83C7C067C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.245",
"matchCriteriaId": "05DE70B5-762A-4042-8465-8690F02688FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.205",
"matchCriteriaId": "5DFB089B-C0CD-422B-9182-497E5451AD10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.142",
"matchCriteriaId": "BABFD545-0405-4B3C-89BF-B7B0A9A5DCDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.60",
"matchCriteriaId": "58120FFF-3B1B-4287-A7D3-657641443823"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.13.12",
"matchCriteriaId": "C31610D4-4A14-453C-8ECC-AFF86AC4D24D"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4197",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-03-23T20:15:10.200",
"lastModified": "2023-02-03T23:59:45.990",
"lastModified": "2023-05-16T10:59:49.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,8 +96,37 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.17",
"matchCriteriaId": "A37A8EE9-3F14-4C7A-A882-DA8A6AD1897C"
"versionStartIncluding": "4.2",
"versionEndExcluding": "4.14.276",
"matchCriteriaId": "DD281643-091B-454C-A61A-FD71E28F0C80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.238",
"matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.189",
"matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.111",
"matchCriteriaId": "96258501-7BCE-4C55-8A38-8AC9D327626D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.14",
"matchCriteriaId": "0B1B7704-C975-4762-A70D-54C594766ED7"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1882",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-05-26T17:15:08.830",
"lastModified": "2022-10-27T16:37:18.837",
"lastModified": "2023-05-16T10:50:30.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,43 +96,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.18",
"matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92"
"versionStartIncluding": "5.10.106",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "FBC8D988-D646-44BA-9409-C31DC962EB9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.29",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "12CFE2A9-84BE-40EA-A0C3-1E7F3BDE518F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "EE723F14-047B-4FCF-B109-E0542EDFB063"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "2FCFCE58-5118-4D05-864E-C82CF20EABE5"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.15",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "030744E8-AA64-4843-A7FF-CD0525472E2A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1943",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-06-02T14:15:34.157",
"lastModified": "2023-02-02T19:22:46.710",
"lastModified": "2023-05-16T10:47:50.740",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -95,38 +95,16 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.18",
"matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92"
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.40",
"matchCriteriaId": "FA13A06E-7213-4625-89D2-C81F9D0C07C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "EE723F14-047B-4FCF-B109-E0542EDFB063"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.8",
"matchCriteriaId": "6A05E0E7-6FCD-4133-9436-366BF4A173AE"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1998",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-06-09T15:15:09.327",
"lastModified": "2022-10-05T15:16:46.450",
"lastModified": "2023-05-16T10:50:19.783",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -96,19 +96,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.17",
"matchCriteriaId": "D317AE96-8138-498A-BDD7-2617EE8093BC"
"versionStartIncluding": "5.10.46",
"versionEndExcluding": "5.10.97",
"matchCriteriaId": "25F32A49-4930-472C-B4C1-9CA94FE77887"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12.12",
"versionEndExcluding": "5.15.20",
"matchCriteriaId": "36182661-FAEB-44BD-9458-9560399D42E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "5.16.6",
"matchCriteriaId": "64A4B4C0-519F-4651-A076-4CEAB004FDC6"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23222",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-14T08:15:07.353",
"lastModified": "2022-10-14T12:01:36.107",
"lastModified": "2023-05-16T10:59:32.267",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -87,8 +87,15 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8.0",
"versionEndIncluding": "5.15.14",
"matchCriteriaId": "6DE79CB3-0EFD-4C0F-AC48-BEFC1B252D71"
"versionEndExcluding": "5.15.37",
"matchCriteriaId": "BB81FD55-CFE5-42D0-9707-ED9D25271020"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.11",
"matchCriteriaId": "0D327234-5D4A-43DC-A6DF-BCA0CEBEC039"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-23548",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-05T19:15:09.423",
"lastModified": "2023-01-18T20:34:34.970",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:15:56.813",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -56,7 +56,7 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -66,12 +66,12 @@
]
},
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
"value": "CWE-1333"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2795",
"sourceIdentifier": "security-officer@isc.org",
"published": "2022-09-21T11:15:09.470",
"lastModified": "2022-11-03T20:44:27.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:01:14.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,7 +21,7 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -29,12 +29,12 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"impactScore": 1.4
},
{
"source": "security-officer@isc.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-32250",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-02T21:15:07.973",
"lastModified": "2022-09-09T20:39:06.987",
"lastModified": "2023-05-16T11:00:01.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -86,8 +86,58 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.18.1",
"matchCriteriaId": "2F861244-9CA5-4190-ADE4-1E988564FEA8"
"versionStartIncluding": "4.1",
"versionEndExcluding": "4.9.318",
"matchCriteriaId": "2EF4A158-12E0-4F0E-BC1B-6E0CB17693A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.120",
"matchCriteriaId": "92818976-ECCC-4744-9287-E2CF4B2C4131"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.45",
"matchCriteriaId": "08D699AD-F4CE-4BDD-A97E-4997299C7712"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.13",
"matchCriteriaId": "192FC54B-5367-49D6-B410-0285F14665B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.2",
"matchCriteriaId": "9FF255A1-64F4-4E31-AF44-C92FB8773BA2"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34918",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-04T21:15:07.730",
"lastModified": "2022-10-26T17:05:18.910",
"lastModified": "2023-05-16T11:00:06.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -86,9 +86,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8.0",
"versionEndIncluding": "5.18.9",
"matchCriteriaId": "15135088-6455-4FD5-937E-8343E9223D77"
"versionStartIncluding": "4.1",
"versionEndExcluding": "5.10.130",
"matchCriteriaId": "D9DE8CDD-0E52-4402-9991-5CAF6A133E21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.54",
"matchCriteriaId": "B2197EF1-3D9C-4EBA-9F94-6C8668E719B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.11",
"matchCriteriaId": "622F881E-3317-4653-9558-86008C2FBFD2"
}
]
}
@ -287,7 +301,8 @@
"url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
@ -295,7 +310,8 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-35917",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-08-01T22:15:10.157",
"lastModified": "2022-08-10T14:33:11.080",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:00:41.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,9 +79,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solana:pay:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:solanalabs:pay:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.2.1",
"matchCriteriaId": "F36A6396-C07B-4CF7-BF84-3183529B506F"
"matchCriteriaId": "BA0D8FFF-0C7B-45CE-B3FD-FF53A6147F8B"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3526",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-16T19:15:09.770",
"lastModified": "2022-10-19T04:36:32.737",
"lastModified": "2023-05-16T10:50:44.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -93,8 +93,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13",
"versionEndExcluding": "5.15.35",
"matchCriteriaId": "153CA16D-E467-453C-8C1E-BA57B4F8A154"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.4",
"matchCriteriaId": "E22C86CB-06CD-4D16-AB2A-F21EE8199262"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-36946",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-27T20:15:08.643",
"lastModified": "2022-10-27T14:14:10.227",
"lastModified": "2023-05-16T11:00:09.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -60,8 +60,51 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.18.14",
"matchCriteriaId": "ABF7248B-E964-4678-9323-06AF633A3E28"
"versionStartIncluding": "2.6.14",
"versionEndExcluding": "4.9.326",
"matchCriteriaId": "9220F971-9877-4B46-8E78-6C63F9EEC17A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.291",
"matchCriteriaId": "3BBC7E43-6161-4F21-977C-5BB7792C6C94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.255",
"matchCriteriaId": "0F412385-907C-4CAD-9E5B-CC397DEE5783"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.209",
"matchCriteriaId": "8A22815E-5E13-479C-8A92-BACF21F911EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.135",
"matchCriteriaId": "BB550DF5-C3A3-4009-A61F-C7293D5A081D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.59",
"matchCriteriaId": "79909FF8-3A4D-4569-8AB9-60BACD5CCD5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.16",
"matchCriteriaId": "F120BA4D-7528-41C4-960F-9133D4EFB5B8"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41553",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2022-11-01T03:15:10.963",
"lastModified": "2023-01-17T05:15:12.827",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:02:33.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -87,8 +87,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachi:infrastructure_analytics_advisor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.9.0-00",
"matchCriteriaId": "361C95FA-B803-4A75-91B4-A1EF3BDF6DAC"
"versionStartIncluding": "2.0.0-00",
"versionEndIncluding": "4.4.0-00",
"matchCriteriaId": "7BC509D6-6EB5-4050-B0A8-776B489C8AD9"
}
]
},
@ -138,7 +139,10 @@
"references": [
{
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html",
"source": "hirt@hitachi.co.jp"
"source": "hirt@hitachi.co.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41717",
"sourceIdentifier": "security@golang.org",
"published": "2022-12-08T20:15:10.330",
"lastModified": "2022-12-12T17:50:10.480",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:51:31.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -68,9 +68,9 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
"versionEndExcluding": "0.4.0",
"matchCriteriaId": "650A1E10-9601-4ED0-A823-C2984E5871BA"
"matchCriteriaId": "BBFC0CE7-CD35-4FCF-A37A-DBC5D6DA16D2"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41723",
"sourceIdentifier": "security@golang.org",
"published": "2023-02-28T18:15:09.980",
"lastModified": "2023-04-22T03:15:08.577",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:50:02.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -66,15 +66,15 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golang:hpack:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:golang:hpack:*:*:*:*:*:go:*:*",
"versionEndExcluding": "0.7.0",
"matchCriteriaId": "BBBBFDFB-0394-49D9-AD41-3585763FA9EC"
"matchCriteriaId": "CA68ED61-191E-4903-B65D-CBA7A0370B8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
"versionEndExcluding": "0.7.0",
"matchCriteriaId": "F6F2BD4C-EEB4-471E-8811-C58CFA030F64"
"matchCriteriaId": "3EBDC12D-E7B0-4138-B6B1-709E61703629"
}
]
}
@ -113,19 +113,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1571",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41727",
"sourceIdentifier": "security@golang.org",
"published": "2023-02-28T18:15:10.200",
"lastModified": "2023-03-10T00:15:40.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T11:03:32.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -65,14 +65,14 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golang:image:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:golang:image:*:*:*:*:*:go:*:*",
"versionEndExcluding": "0.5.0",
"matchCriteriaId": "8024048A-7618-45D1-868C-0E739C6181DB"
"matchCriteriaId": "0F6F1ACD-0877-4166-A546-4FFF4046AAE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golang:tiff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A262FD44-4DCC-435C-8FBF-357191243E5D"
"criteria": "cpe:2.3:a:golang:tiff:-:*:*:*:*:go:*:*",
"matchCriteriaId": "6799AD0E-4DCC-4BE8-B437-C3D68222F918"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4285",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-27T18:15:15.977",
"lastModified": "2023-02-07T19:46:46.590",
"lastModified": "2023-05-16T11:03:27.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.35",
"versionEndExcluding": "2.39-7",
"matchCriteriaId": "6673DD07-0AF1-4FC3-8B8D-0CCC74D82C07"
"matchCriteriaId": "A7CFD0F7-6794-4E57-9B17-B7F0CDC5103C"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-44640",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-25T05:15:11.103",
"lastModified": "2023-02-16T14:15:17.567",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:03:18.913",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,6 +62,37 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15.0",
"versionEndExcluding": "4.15.3",
"matchCriteriaId": "760EE8B5-7BCD-4BBD-81B8-3E12651AEA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.16.0",
"versionEndExcluding": "4.16.8",
"matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.17.0",
"versionEndExcluding": "4.17.4",
"matchCriteriaId": "96E911B3-B4DD-451C-9579-74559328F89F"
}
]
}
]
}
],
"references": [
@ -74,7 +105,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46265",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:25.263",
"lastModified": "2023-04-11T10:15:17.897",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-16T10:51:00.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -86,7 +86,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:polarion_alm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8524B7BF-389F-458A-9354-FD5D3063DE2C"
"versionEndExcluding": "2304.0",
"matchCriteriaId": "0B04B897-3DD0-4715-9BE0-D5AF4E008B14"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47939",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-23T16:15:12.290",
"lastModified": "2023-03-30T23:15:06.347",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:03:04.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -57,8 +57,22 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.61",
"matchCriteriaId": "C95FAD7E-9653-4C03-B54B-72E835223C4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.18",
"matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "5.19.2",
"matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3"
"matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F"
}
]
}
@ -102,7 +116,10 @@
},
{
"url": "https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1690/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47941",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-23T16:15:12.710",
"lastModified": "2023-01-23T18:55:08.683",
"lastModified": "2023-05-16T11:03:07.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -57,8 +57,22 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.61",
"matchCriteriaId": "C95FAD7E-9653-4C03-B54B-72E835223C4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.18",
"matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "5.19.2",
"matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3"
"matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47942",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-23T16:15:12.863",
"lastModified": "2023-01-23T18:54:51.420",
"lastModified": "2023-05-16T11:03:10.667",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -57,8 +57,22 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.62",
"matchCriteriaId": "71F188B5-F7A2-4F91-B40B-02ACCA3184A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.18",
"matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "5.19.2",
"matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3"
"matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47943",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-23T17:15:08.993",
"lastModified": "2023-02-16T14:15:18.083",
"vulnStatus": "Modified",
"lastModified": "2023-05-16T11:03:14.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -57,8 +57,22 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.62",
"matchCriteriaId": "71F188B5-F7A2-4F91-B40B-02ACCA3184A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.18",
"matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "5.19.2",
"matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3"
"matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F"
}
]
}
@ -102,7 +116,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230216-0006/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1691/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1729",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:10.350",
"lastModified": "2023-05-15T22:15:10.350",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20673",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.427",
"lastModified": "2023-05-15T22:15:10.427",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20694",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.480",
"lastModified": "2023-05-15T22:15:10.480",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20695",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.523",
"lastModified": "2023-05-15T22:15:10.523",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20696",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.563",
"lastModified": "2023-05-15T22:15:10.563",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20697",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.603",
"lastModified": "2023-05-15T22:15:10.603",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20698",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.647",
"lastModified": "2023-05-15T22:15:10.647",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20699",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.690",
"lastModified": "2023-05-15T22:15:10.690",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20700",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.743",
"lastModified": "2023-05-15T22:15:10.743",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20701",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.787",
"lastModified": "2023-05-15T22:15:10.787",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20703",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.830",
"lastModified": "2023-05-15T22:15:10.830",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20704",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.870",
"lastModified": "2023-05-15T22:15:10.870",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20705",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.910",
"lastModified": "2023-05-15T22:15:10.910",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20706",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.947",
"lastModified": "2023-05-15T22:15:10.947",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20707",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:10.993",
"lastModified": "2023-05-15T22:15:10.993",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20708",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.033",
"lastModified": "2023-05-15T22:15:11.033",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20709",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.073",
"lastModified": "2023-05-15T22:15:11.073",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20710",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.113",
"lastModified": "2023-05-15T22:15:11.113",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20711",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.150",
"lastModified": "2023-05-15T22:15:11.150",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20717",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.190",
"lastModified": "2023-05-15T22:15:11.190",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20718",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.230",
"lastModified": "2023-05-15T22:15:11.230",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20719",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.273",
"lastModified": "2023-05-15T22:15:11.273",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20720",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.313",
"lastModified": "2023-05-15T22:15:11.313",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20721",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.350",
"lastModified": "2023-05-15T22:15:11.350",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20722",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.390",
"lastModified": "2023-05-15T22:15:11.390",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20726",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-05-15T22:15:11.433",
"lastModified": "2023-05-15T22:15:11.433",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20914",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.473",
"lastModified": "2023-05-15T22:15:11.473",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20930",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.513",
"lastModified": "2023-05-15T22:15:11.513",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21102",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.623",
"lastModified": "2023-05-15T22:15:11.623",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21103",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.687",
"lastModified": "2023-05-15T22:15:11.687",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21104",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.737",
"lastModified": "2023-05-15T22:15:11.737",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21106",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.777",
"lastModified": "2023-05-15T22:15:11.777",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21107",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.830",
"lastModified": "2023-05-15T22:15:11.830",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21109",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.870",
"lastModified": "2023-05-15T22:15:11.870",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21110",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.910",
"lastModified": "2023-05-15T22:15:11.910",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21111",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.950",
"lastModified": "2023-05-15T22:15:11.950",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21112",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:11.987",
"lastModified": "2023-05-15T22:15:11.987",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21116",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.027",
"lastModified": "2023-05-15T22:15:12.027",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21117",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.067",
"lastModified": "2023-05-15T22:15:12.067",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21118",
"sourceIdentifier": "security@android.com",
"published": "2023-05-15T22:15:12.107",
"lastModified": "2023-05-15T22:15:12.107",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2124",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:12.150",
"lastModified": "2023-05-15T22:15:12.150",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2161",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2023-05-16T05:15:09.357",
"lastModified": "2023-05-16T05:15:09.357",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23641",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T10:15:09.277",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPmanage Uji Popup plugin <=\u00a01.4.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/uji-popup/wordpress-uji-popup-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23657",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T10:15:09.350",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Richard Leishman t/a Webforward Mail Subscribe List plugin <=\u00a02.1.9 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mail-subscribe-list/wordpress-mail-subscribe-list-plugin-2-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23673",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T09:15:09.313",
"lastModified": "2023-05-16T09:15:09.313",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23676",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T09:15:09.720",
"lastModified": "2023-05-16T09:15:09.720",
"vulnStatus": "Received",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23703",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T10:15:09.407",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Arconix Shortcodes plugin <=\u00a02.1.7 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/arconix-shortcodes/wordpress-arconix-shortcodes-plugin-2-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23709",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-16T10:15:09.467",
"lastModified": "2023-05-16T10:46:36.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Denis WPJAM Basic plugin <=\u00a06.2.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpjam-basic/wordpress-wpjam-basic-plugin-6-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More