Auto-Update: 2024-02-02T05:00:24.708571+00:00

This commit is contained in:
cad-safe-bot 2024-02-02 05:00:28 +00:00
parent fa6bf666f1
commit 9b31c36363
79 changed files with 1737 additions and 859 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-0248",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-06-18T04:00:00.000",
"lastModified": "2017-12-19T02:29:18.517",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:06:07.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-131"
}
]
}
@ -56,30 +78,25 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"
}
]
}
@ -98,20 +115,30 @@
},
{
"url": "http://www.nai.com/research/covert/advisories/048.asp",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/2552",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6332",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-0249",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-06-18T04:00:00.000",
"lastModified": "2018-10-30T16:26:22.763",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:06:01.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-131"
}
]
}
@ -58,38 +80,20 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B"
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6"
"criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*",
"matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"
"criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndIncluding": "6.5.20",
"matchCriteriaId": "24278E6E-AC94-4083-8838-41BF30D7D5F6"
}
]
}
@ -108,19 +112,29 @@
},
{
"url": "http://www.nai.com/research/covert/advisories/048.asp",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/2550",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6332",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-0334",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-06-27T04:00:00.000",
"lastModified": "2018-10-12T21:30:20.860",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:06:11.707",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-131"
}
]
}
@ -70,11 +92,19 @@
"references": [
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-026",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6535",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2002-0184",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-05-16T04:00:00.000",
"lastModified": "2021-04-01T12:58:43.567",
"lastModified": "2024-02-02T03:05:54.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-131"
}
]
}
@ -91,6 +113,7 @@
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000475",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -98,8 +121,7 @@
"url": "http://marc.info/?l=bugtraq&m=101974610509912&w=2",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -107,7 +129,7 @@
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
"Patch"
]
},
{
@ -115,21 +137,21 @@
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
"Patch"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102010164413135&w=2",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-128",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -159,6 +181,7 @@
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2040.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -174,6 +197,7 @@
"url": "http://www.redhat.com/support/errata/RHSA-2002-071.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -181,6 +205,7 @@
"url": "http://www.redhat.com/support/errata/RHSA-2002-072.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -188,6 +213,7 @@
"url": "http://www.securityfocus.com/bid/4593",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-1347",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-18T05:00:00.000",
"lastModified": "2017-07-11T01:29:13.960",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:05:42.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-131"
}
]
}
@ -62,9 +84,31 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cyrus:sasl:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:cyrusimap:cyrus_sasl:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.1.9",
"matchCriteriaId": "FB40749C-6BC9-47A3-88BB-90995581C4E0"
"matchCriteriaId": "5A309C1F-0137-4CCF-B438-1CE6719A547A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.3.8",
"matchCriteriaId": "9290FC8C-8362-4595-A859-044D5FE848D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.3.8",
"matchCriteriaId": "AB201A37-9EA9-46B4-A799-4DCC5326E88D"
}
]
}
@ -74,55 +118,106 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=103946297703402&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-215",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-283.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/advisories/4826",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/6347",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/6348",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/6349",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10810",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10811",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10812",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-0434",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-07-07T04:00:00.000",
"lastModified": "2020-11-16T19:29:30.453",
"lastModified": "2024-02-02T03:05:48.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-131"
}
]
}
@ -91,6 +113,7 @@
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -98,6 +121,7 @@
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -105,8 +129,7 @@
"url": "http://marc.info/?l=bugtraq&m=108386148126457&w=2",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -120,6 +143,7 @@
"url": "http://www.debian.org/security/2004/dsa-504",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0940",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-02-09T05:00:00.000",
"lastModified": "2023-11-07T01:56:50.250",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:05:26.170",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -18,6 +18,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -51,7 +73,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-131"
}
]
}
@ -65,123 +87,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "28EC1F94-04F3-490A-8324-1EB60EEBAD4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30D94958-0D13-4076-B6F0-61D505136789"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B22DA22E-54DA-46CF-B3AE-4B0900D8086A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F90F496A-5D57-448F-A46F-E15F06CBFD01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "89B58983-633F-4D20-80AE-8E7EB865CF83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:*",
"matchCriteriaId": "34FD94C9-2352-4147-9BF2-A3CF841A159B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6EE0E2-D608-4E72-A0E5-F407511405C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "33FD6791-3B84-40CA-BCF4-B5637B172F2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDD2F69-CFD4-4DEA-B43A-1337EEFA95A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "0A80B17D-FD66-40BD-9ADC-FE7A3944A696"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "713ADED4-CBE5-40C3-A128-99CFABF24560"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "70FA0B8E-1A90-4939-871A-38B9E93BCCC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "83BDEAE5-29B9-48E3-93FA-F30832044C9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A2720E06-1B0E-4BFE-8C85-A17E597BB151"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE1DECF-36C7-4968-8B7A-7A2034C2A957"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B67BD173-8517-4E97-BC65-D9657C63601A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*",
"matchCriteriaId": "B392A96F-FD2F-4073-8EED-EB31E1F20FE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E130104B-86F5-411E-8AC0-9B4B780BCA00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0E62E621-74DA-4D99-A79C-AD2B85896A2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "2C577188-BD56-4571-A61A-1684DC9E9DD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3A4CD9-1E96-4D3B-938D-F2D15855B0DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "4058CE14-1CC8-42FD-A6BD-6869C1610E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "0716E399-A5FE-4C49-BC48-CD97C03997A7"
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.3",
"versionEndIncluding": "1.3.32",
"matchCriteriaId": "E48FC2F5-318B-4460-861D-80314B42F84B"
},
{
"vulnerable": true,
@ -197,11 +106,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11F6E348-01DF-4FA4-808E-39A2A7A2B97B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
"matchCriteriaId": "D342447B-5233-45FD-B1CF-8D84921402AD"
}
]
}
@ -283,11 +187,6 @@
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
"matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
@ -311,92 +210,167 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=109906660225051&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/12898/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/19073",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1011783",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.apacheweek.com/features/security-13",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://www.debian.org/security/2004/dsa-594",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:134",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-600.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-816.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/11471",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/0789",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17785",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-0490",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2017-10-11T01:29:56.560",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:05:29.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-131"
}
]
}
@ -58,13 +80,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4848C3C8-432D-43E7-B0D9-8FD69D4C3B0F"
"criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DEC10D0-622A-4037-9D4A-69814226CC6C"
"criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D"
}
]
}
@ -76,26 +98,31 @@
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://marc.info/?l=full-disclosure&m=110959085507755&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -103,36 +130,63 @@
"url": "http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-340.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/12615",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/12616",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2005-4650",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2008-09-05T20:57:26.687",
"lastModified": "2024-02-02T03:07:38.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -44,7 +44,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-770"
}
]
}
@ -58,8 +58,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:joomla:joomla:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E9C4B0-5B4B-4103-AA4E-419E08C22306"
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BC6A159A-7C68-41A3-A41E-5008D5F293EA"
}
]
}
@ -67,9 +67,30 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/17675",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.joomla.org/content/view/499/66/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Product"
]
},
{
"url": "http://www.osvdb.org/21041",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-3268",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-18T23:30:00.000",
"lastModified": "2017-07-29T01:32:07.910",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:03:40.700",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-369"
}
]
}
@ -75,27 +97,51 @@
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=560",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/26093",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1018401",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24016347",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/24942",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2560",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www3.software.ibm.com/ibmdl/pub/software/tivoli_support/patches/patches_5.1.0/5.1.0-TIV-TPMOSD-FP0003/5.1.0-TIV-TPMOSD-FP0003.README.HTM",
@ -106,7 +152,11 @@
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35468",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-1700",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-04-08T18:05:00.000",
"lastModified": "2017-08-08T01:30:22.713",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:07:30.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,18 +21,18 @@
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
"baseScore": 7.1
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-770"
}
]
}
@ -76,12 +76,17 @@
"url": "http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41757",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-5180",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-11-20T15:30:00.390",
"lastModified": "2017-09-29T01:32:29.867",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:07:25.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-770"
}
]
}
@ -71,33 +71,71 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/32940",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.exploit-db.com/exploits/12079",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/39221",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1021294",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.voipshield.com/research-details.php?id=133",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46673",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57581",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/7262",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-2540",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-07-20T18:30:01.233",
"lastModified": "2018-10-30T16:26:33.437",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:07:21.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-770"
}
]
}
@ -65,121 +65,6 @@
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.64",
"matchCriteriaId": "25CB886F-4E01-4E01-ACF7-7CB90FA2A6D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201"
}
]
}
@ -189,38 +74,71 @@
"references": [
{
"url": "http://www.exploit-db.com/exploits/9160",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52874",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5957",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-10003",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-01-27T17:59:00.180",
"lastModified": "2017-02-28T02:37:35.973",
"lastModified": "2024-02-02T03:03:55.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-697"
}
]
}
@ -84,223 +84,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E0868B12-EDF9-42D9-BB43-15F623A3310B"
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5.0.1",
"versionEndExcluding": "3.5.23",
"matchCriteriaId": "9AE6398D-3000-4C1B-8BB3-37AE280BEDD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F710949D-F0FE-43F4-ADB3-6EB679A70280"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB75144-2437-40A8-8CA3-A487B603F7DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6CED2CB3-BE78-4818-A6D7-847A1ACE74DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "705D8320-A278-483A-AE47-802044CE685E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "715634E1-F7BE-4106-BDA7-B7D147EEA800"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "21E9E155-FC6F-46E7-8BF7-65DF097409D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CF72FA7A-E35D-4000-9DDA-71E55EA3A4D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "26A3F10F-938E-44D6-845D-B66EF9812C21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D82EEE-F65E-4657-B0F7-6CE33D219134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E6A845-B67C-4112-8240-9F61D6AF3B0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEDD7E3-E263-4A09-9C11-3E008E01BC28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "80E3FF16-A6CD-456C-B58A-381A75D8616C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87D02AB2-AA26-4416-B689-02C5EEF2099C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A134E1F1-AFCC-498B-8840-5884CF858769"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F4E7D0-B6F4-476E-A011-55619E91A3B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "95588755-27E8-4DB7-B865-A784D3638FE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD4DDBC-4243-459A-B43D-FF8F0AE0BA3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0F90E11F-FC03-46D9-A9C4-A578196D59D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC9BEE2-D7E4-4192-963C-E9F2364FC8CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "CA0BDDAD-2912-480F-8911-8FF94E1A7415"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "275C4ED9-0C69-4CFD-9C1D-D734731DD940"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "647A80E8-9AA4-41B4-B2F2-9D07D839DFEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3EDC70-9DE3-454E-A90D-7D4A4C082517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "8E397BA5-4FA4-402F-BFCC-9077ED93C438"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4649C5C3-7371-4B92-9E06-73AE4CF39685"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "060FCBEA-DEAA-42FB-88C9-4B78136B172F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "74987102-8CA8-4120-B686-F18579A96A46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA7828AA-48B6-44CD-8507-345A4F0A25BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6640F25F-CC8B-4B05-A97A-2186BD0B5ED8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A037F780-6FC9-4130-908F-B5434FA0C7DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1DDEB455-F082-44E4-8CEA-019C0084BF05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "49555803-288E-4B0A-B12A-890E5E0AD05F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEE374C-365E-49DE-A9F9-6083044C774D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6B2A8E-DD81-43CD-9F5B-E8F87498E513"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "179ACC3B-D8C8-4CE2-964F-CBF29BBB066A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "252E5ABE-5113-4987-931E-16B69C4CE424"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9285C454-7F60-4AEA-A134-124C1E0745FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F753944-8EC0-4CE5-98E5-71798F9EC663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BD3131-D4F3-4B29-9408-754B6190DAEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "3F00481A-5E3B-45A1-A2A5-56E63F91C834"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "217AB656-D70C-4009-8797-C58002FDB6C0"
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.1",
"versionEndExcluding": "4.0.17",
"matchCriteriaId": "32C73B3C-ECDF-450E-A039-9F09A18570E4"
}
]
}
@ -321,6 +115,7 @@
"url": "http://www.securityfocus.com/bid/94953",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -329,6 +124,7 @@
"url": "http://www.securitytracker.com/id/1037512",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -337,7 +133,6 @@
"url": "http://www.squid-cache.org/Advisories/SQUID-2016_10.txt",
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1010006",
"sourceIdentifier": "josh@bress.net",
"published": "2019-07-15T02:15:10.370",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:07:20.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -94,6 +94,66 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493"
}
]
}
]
}
],
"references": [
@ -108,7 +168,11 @@
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00046.html",
"source": "josh@bress.net"
"source": "josh@bress.net",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=788980",
@ -121,23 +185,41 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00013.html",
"source": "josh@bress.net"
"source": "josh@bress.net",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00014.html",
"source": "josh@bress.net"
"source": "josh@bress.net",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/bugtraq/2020/Feb/18",
"source": "josh@bress.net"
"source": "josh@bress.net",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4067-1/",
"source": "josh@bress.net"
"source": "josh@bress.net",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2020/dsa-4624",
"source": "josh@bress.net"
"source": "josh@bress.net",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-15811",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-02T17:15:11.687",
"lastModified": "2023-11-07T03:17:55.657",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:04:21.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-444"
"value": "CWE-697"
}
]
}
@ -211,8 +211,7 @@
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
@ -225,15 +224,27 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20210219-0007/",
@ -253,6 +264,7 @@
"url": "https://security.netapp.com/advisory/ntap-20210226-0007/",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -274,6 +286,7 @@
"url": "https://www.debian.org/security/2020/dsa-4751",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-30663",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T15:15:13.413",
"lastModified": "2021-09-16T20:25:10.350",
"lastModified": "2024-02-02T03:08:37.943",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Safari Webkit Browser Engine Integer Overflow Vulnerability",
"cisaVulnerabilityName": "Apple Multiple Products Integer Overflow Vulnerability",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30860",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-08-24T19:15:14.370",
"lastModified": "2023-11-07T03:33:34.353",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:08:54.213",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -199,63 +199,116 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/25",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/26",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/27",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/28",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/38",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/39",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/40",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Sep/50",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2022/09/02/11",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202209-21",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212804",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212805",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212806",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT212807",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT212824",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-43537",
"sourceIdentifier": "security@mozilla.org",
"published": "2021-12-08T22:15:09.620",
"lastModified": "2022-12-09T15:19:17.787",
"lastModified": "2024-02-02T03:05:31.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -136,7 +136,6 @@
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
]
},
@ -174,6 +173,7 @@
"url": "https://www.debian.org/security/2021/dsa-5026",
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -181,6 +181,7 @@
"url": "https://www.debian.org/security/2022/dsa-5034",
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-0545",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2022-02-24T19:15:09.760",
"lastModified": "2023-11-07T03:41:22.123",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:09:18.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -75,7 +75,7 @@
]
},
{
"source": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
@ -142,6 +142,7 @@
"url": "https://developer.blender.org/T94629",
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
@ -150,6 +151,7 @@
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html",
"source": "patrick@puiterwijk.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2022-40744",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T04:15:07.700",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236441."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236441",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7111778",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32333",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:16.323",
"lastModified": "2024-02-02T02:15:16.323",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38019",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T04:15:07.937",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 260575."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260575",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7111679",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38020",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T04:15:08.147",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-117"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260576",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7111679",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38263",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T04:15:08.360",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 260577."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260577",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7111679",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40088",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.230",
"lastModified": "2023-12-22T01:15:10.340",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:15:16.057",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/5bfd817719fcf55cbb3476e6b5539a3db4c437fc",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40089",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.283",
"lastModified": "2023-12-22T01:15:10.407",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:15:30.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,12 +70,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40090",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.337",
"lastModified": "2023-12-22T01:15:10.473",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:15:34.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40091",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.387",
"lastModified": "2023-12-22T01:15:10.543",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:15:39.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40092",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.440",
"lastModified": "2023-12-22T01:15:10.613",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:15:44.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/a5e55363e69b3c84d3f4011c7b428edb1a25752c",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40094",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.493",
"lastModified": "2023-12-22T01:15:10.677",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:10:05.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,7 +90,11 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40095",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.547",
"lastModified": "2023-12-22T01:15:10.740",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:09:57.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40096",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.600",
"lastModified": "2023-12-22T01:15:10.803",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:14:44.280",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,24 +90,37 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/148aeea373febc959c429f2cabd8323508c38ad8",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/av/+/5f401fc9f214789d691798620fea60015962370a",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/b0f6558fb36eb76df35c516ec5a65030a34a8734",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/native/+/9ddecd3d2b88de5ff7aa890d7ba9967c30d8b183",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40097",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.657",
"lastModified": "2023-12-22T01:15:10.867",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:14:39.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,12 +85,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Launcher3/+/6c9a41117d5a9365cf34e770bbb00138f6bf997e",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40098",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.707",
"lastModified": "2023-12-22T01:15:10.953",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:14:34.950",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,12 +85,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40103",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:24.757",
"lastModified": "2023-12-22T01:15:11.020",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:14:29.707",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,20 +70,33 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/58fa254a5d1aee2206de90d5396c01e177483e3a",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/c3bc12c484ef3bbca4cec19234437c45af5e584d",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40462",
"sourceIdentifier": "security@sierrawireless.com",
"published": "2023-12-04T23:15:25.603",
"lastModified": "2023-12-31T00:15:44.220",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:12:25.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -138,12 +138,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00024.html",
"source": "security@sierrawireless.com"
"source": "security@sierrawireless.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42882",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:11.280",
"lastModified": "2024-01-12T16:15:51.933",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:10:11.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-787"
}
]
}
@ -72,7 +72,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42883",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:11.330",
"lastModified": "2023-12-19T21:15:08.097",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:10:50.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -111,6 +111,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
@ -164,7 +184,11 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/18/1",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214034",
@ -216,7 +240,11 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5580",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42890",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:11.480",
"lastModified": "2024-01-31T15:15:10.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-02-02T03:11:18.417",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -142,11 +142,18 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/18/1",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-33",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214035",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42894",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:11.587",
"lastModified": "2023-12-13T01:15:08.533",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:11:25.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -86,15 +86,27 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214036",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42926",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-12-12T01:15:12.683",
"lastModified": "2024-01-12T16:15:52.007",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:11:34.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -72,7 +72,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45773",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:26.440",
"lastModified": "2023-12-22T01:15:11.080",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:13:12.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -75,12 +75,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45774",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:26.483",
"lastModified": "2023-12-22T01:15:11.150",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:13:23.130",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,12 +90,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45775",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:26.530",
"lastModified": "2023-12-22T01:15:11.220",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:13:30.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,12 +70,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45776",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:26.577",
"lastModified": "2023-12-22T01:15:11.297",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:14:10.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -70,12 +70,17 @@
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45777",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:26.623",
"lastModified": "2023-12-22T01:15:11.367",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T03:14:19.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -75,16 +75,25 @@
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f4644b55d36a549710ba35b6fb797ba744807da6",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-12-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-46159",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T03:15:09.920",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW. IBM X-Force ID: 268906."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 2.6,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268906",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7112263",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46344",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.537",
"lastModified": "2024-02-02T02:15:16.537",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46838",
"sourceIdentifier": "security@xen.org",
"published": "2024-01-29T11:15:07.933",
"lastModified": "2024-02-02T02:06:40.353",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-02T03:15:10.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -70,6 +70,14 @@
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/",
"source": "security@xen.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/",
"source": "security@xen.org"
},
{
"url": "https://xenbits.xenproject.org/xsa/advisory-448.html",
"source": "security@xen.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48792",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.590",
"lastModified": "2024-02-02T02:15:16.590",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48793",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.637",
"lastModified": "2024-02-02T02:15:16.637",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50328",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:16.683",
"lastModified": "2024-02-02T02:15:16.683",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50934",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:16.890",
"lastModified": "2024-02-02T02:15:16.890",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50935",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.087",
"lastModified": "2024-02-02T02:15:17.087",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50938",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.277",
"lastModified": "2024-02-02T02:15:17.277",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50941",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.467",
"lastModified": "2024-02-02T02:15:17.467",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50962",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.667",
"lastModified": "2024-02-02T02:15:17.667",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5156",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-25T16:15:15.613",
"lastModified": "2023-12-15T18:18:02.487",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-02T04:15:08.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -165,6 +165,10 @@
"Patch"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-01",
"source": "secalert@redhat.com"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=30884",
"source": "secalert@redhat.com",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6246",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.420",
"lastModified": "2024-02-01T06:15:53.180",
"lastModified": "2024-02-02T04:15:08.713",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria en la funci\u00f3n __vsyslog_internal de la librer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando no se llam\u00f3 a la funci\u00f3n openlog, o se llam\u00f3 con el argumento ident establecido en NULL, y el nombre del programa (el nombre base de argv[0]) tiene m\u00e1s de 1024 bytes, lo que provoca un bloqueo de la aplicaci\u00f3n o una escalada de privilegios locales. Este problema afecta a glibc 2.36 y versiones posteriores."
}
],
"metrics": {
@ -142,6 +146,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202402-01",
"source": "secalert@redhat.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
"source": "secalert@redhat.com",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6779",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.700",
"lastModified": "2024-02-01T06:15:53.350",
"lastModified": "2024-02-02T04:15:08.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria de off-by-one en la funci\u00f3n __vsyslog_internal de la librer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando estas funciones se llaman con un mensaje mayor que INT_MAX bytes, lo que genera un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer para almacenar el mensaje, lo que provoca un bloqueo de la aplicaci\u00f3n. Este problema afecta a glibc 2.37 y posteriores."
}
],
"metrics": {
@ -67,6 +71,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202402-01",
"source": "secalert@redhat.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
"source": "secalert@redhat.com"

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6780",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.917",
"lastModified": "2024-02-01T06:15:53.443",
"lastModified": "2024-02-02T04:15:08.907",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un desbordamiento de enteros en la funci\u00f3n __vsyslog_internal de la liibrer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando estas funciones se llaman con un mensaje muy largo, lo que genera un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer para almacenar el mensaje, lo que genera un comportamiento indefinido. Este problema afecta a glibc 2.37 y posteriores."
}
],
"metrics": {
@ -67,6 +71,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202402-01",
"source": "secalert@redhat.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1059",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-01-30T22:15:52.937",
"lastModified": "2024-01-31T14:05:27.507",
"lastModified": "2024-02-02T03:15:10.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -23,6 +23,10 @@
{
"url": "https://crbug.com/1514777",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1060",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-01-30T22:15:53.000",
"lastModified": "2024-01-31T14:05:27.507",
"lastModified": "2024-02-02T03:15:10.313",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -23,6 +23,10 @@
{
"url": "https://crbug.com/1511567",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1077",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-01-30T22:15:53.090",
"lastModified": "2024-01-31T14:05:27.507",
"lastModified": "2024-02-02T03:15:10.417",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -23,6 +23,10 @@
{
"url": "https://crbug.com/1511085",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-20305",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-01-26T18:15:11.350",
"lastModified": "2024-02-01T21:14:41.087",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-02T03:15:10.463",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
"value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
},
{
"lang": "es",
@ -68,6 +68,16 @@
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22319",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T03:15:10.573",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote attacker to conduct an LDAP injection. By sending a request with a specially crafted request, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter. IBM X-Force ID: 279145."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-90"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279145",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7112382",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22320",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T03:15:10.780",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279146",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7112382",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22420",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-19T21:15:09.667",
"lastModified": "2024-01-26T20:12:04.627",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-02T03:15:10.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22421",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-19T21:15:09.870",
"lastModified": "2024-01-26T20:15:23.507",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-02T03:15:11.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22533",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T03:15:11.210",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/xiandafu/beetl/issues/I8RU01",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22779",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:17.890",
"lastModified": "2024-02-02T02:15:17.890",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22899",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.073",
"lastModified": "2024-02-02T02:15:18.073",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22900",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.127",
"lastModified": "2024-02-02T02:15:18.127",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22901",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.177",
"lastModified": "2024-02-02T02:15:18.177",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22902",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.223",
"lastModified": "2024-02-02T02:15:18.223",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22903",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.277",
"lastModified": "2024-02-02T02:15:18.277",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23746",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:18.330",
"lastModified": "2024-02-02T02:15:18.330",
"vulnStatus": "Received",
"lastModified": "2024-02-02T04:58:55.817",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-02T03:00:57.302409+00:00
2024-02-02T05:00:24.708571+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-02T02:59:48.153000+00:00
2024-02-02T04:58:55.817000+00:00
```
### Last Data Feed Release
@ -29,68 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
237371
237379
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `8`
* [CVE-2023-50326](CVE-2023/CVE-2023-503xx/CVE-2023-50326.json) (`2024-02-02T01:15:07.710`)
* [CVE-2023-50327](CVE-2023/CVE-2023-503xx/CVE-2023-50327.json) (`2024-02-02T01:15:07.937`)
* [CVE-2023-50933](CVE-2023/CVE-2023-509xx/CVE-2023-50933.json) (`2024-02-02T01:15:08.140`)
* [CVE-2023-50936](CVE-2023/CVE-2023-509xx/CVE-2023-50936.json) (`2024-02-02T01:15:08.310`)
* [CVE-2023-50937](CVE-2023/CVE-2023-509xx/CVE-2023-50937.json) (`2024-02-02T01:15:08.520`)
* [CVE-2023-50940](CVE-2023/CVE-2023-509xx/CVE-2023-50940.json) (`2024-02-02T01:15:08.753`)
* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T02:15:16.323`)
* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T02:15:16.537`)
* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T02:15:16.590`)
* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T02:15:16.637`)
* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T02:15:16.683`)
* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T02:15:16.890`)
* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T02:15:17.087`)
* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T02:15:17.277`)
* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T02:15:17.467`)
* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T02:15:17.667`)
* [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-02-02T01:15:08.970`)
* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T02:15:17.890`)
* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T02:15:18.073`)
* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T02:15:18.127`)
* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T02:15:18.177`)
* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T02:15:18.223`)
* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T02:15:18.277`)
* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T02:15:18.330`)
* [CVE-2022-40744](CVE-2022/CVE-2022-407xx/CVE-2022-40744.json) (`2024-02-02T04:15:07.700`)
* [CVE-2023-46159](CVE-2023/CVE-2023-461xx/CVE-2023-46159.json) (`2024-02-02T03:15:09.920`)
* [CVE-2023-38019](CVE-2023/CVE-2023-380xx/CVE-2023-38019.json) (`2024-02-02T04:15:07.937`)
* [CVE-2023-38020](CVE-2023/CVE-2023-380xx/CVE-2023-38020.json) (`2024-02-02T04:15:08.147`)
* [CVE-2023-38263](CVE-2023/CVE-2023-382xx/CVE-2023-38263.json) (`2024-02-02T04:15:08.360`)
* [CVE-2024-22319](CVE-2024/CVE-2024-223xx/CVE-2024-22319.json) (`2024-02-02T03:15:10.573`)
* [CVE-2024-22320](CVE-2024/CVE-2024-223xx/CVE-2024-22320.json) (`2024-02-02T03:15:10.780`)
* [CVE-2024-22533](CVE-2024/CVE-2024-225xx/CVE-2024-22533.json) (`2024-02-02T03:15:11.210`)
### CVEs modified in the last Commit
Recently modified CVEs: `94`
Recently modified CVEs: `70`
* [CVE-2024-23033](CVE-2024/CVE-2024-230xx/CVE-2024-23033.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-23034](CVE-2024/CVE-2024-230xx/CVE-2024-23034.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-24756](CVE-2024/CVE-2024-247xx/CVE-2024-24756.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-21764](CVE-2024/CVE-2024-217xx/CVE-2024-21764.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-21794](CVE-2024/CVE-2024-217xx/CVE-2024-21794.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-21866](CVE-2024/CVE-2024-218xx/CVE-2024-21866.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-21869](CVE-2024/CVE-2024-218xx/CVE-2024-21869.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-22016](CVE-2024/CVE-2024-220xx/CVE-2024-22016.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-22096](CVE-2024/CVE-2024-220xx/CVE-2024-22096.json) (`2024-02-02T01:57:57.640`)
* [CVE-2024-21852](CVE-2024/CVE-2024-218xx/CVE-2024-21852.json) (`2024-02-02T01:58:03.307`)
* [CVE-2024-23747](CVE-2024/CVE-2024-237xx/CVE-2024-23747.json) (`2024-02-02T02:03:39.093`)
* [CVE-2024-22559](CVE-2024/CVE-2024-225xx/CVE-2024-22559.json) (`2024-02-02T02:03:48.573`)
* [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-02-02T02:04:13.267`)
* [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-02-02T02:05:39.277`)
* [CVE-2024-23791](CVE-2024/CVE-2024-237xx/CVE-2024-23791.json) (`2024-02-02T02:07:28.850`)
* [CVE-2024-23792](CVE-2024/CVE-2024-237xx/CVE-2024-23792.json) (`2024-02-02T02:07:40.577`)
* [CVE-2024-23790](CVE-2024/CVE-2024-237xx/CVE-2024-23790.json) (`2024-02-02T02:07:58.653`)
* [CVE-2024-0212](CVE-2024/CVE-2024-02xx/CVE-2024-0212.json) (`2024-02-02T02:08:12.603`)
* [CVE-2024-24736](CVE-2024/CVE-2024-247xx/CVE-2024-24736.json) (`2024-02-02T02:08:23.417`)
* [CVE-2024-0959](CVE-2024/CVE-2024-09xx/CVE-2024-0959.json) (`2024-02-02T02:18:46.160`)
* [CVE-2024-0960](CVE-2024/CVE-2024-09xx/CVE-2024-0960.json) (`2024-02-02T02:19:05.557`)
* [CVE-2024-0962](CVE-2024/CVE-2024-09xx/CVE-2024-0962.json) (`2024-02-02T02:19:44.257`)
* [CVE-2024-0958](CVE-2024/CVE-2024-09xx/CVE-2024-0958.json) (`2024-02-02T02:20:21.333`)
* [CVE-2024-0470](CVE-2024/CVE-2024-04xx/CVE-2024-0470.json) (`2024-02-02T02:47:35.793`)
* [CVE-2024-0471](CVE-2024/CVE-2024-04xx/CVE-2024-0471.json) (`2024-02-02T02:48:16.190`)
* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-02T04:15:08.813`)
* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-02-02T04:15:08.907`)
* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T04:58:55.817`)
* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-1059](CVE-2024/CVE-2024-10xx/CVE-2024-1059.json) (`2024-02-02T03:15:10.207`)
* [CVE-2024-1060](CVE-2024/CVE-2024-10xx/CVE-2024-1060.json) (`2024-02-02T03:15:10.313`)
* [CVE-2024-1077](CVE-2024/CVE-2024-10xx/CVE-2024-1077.json) (`2024-02-02T03:15:10.417`)
* [CVE-2024-20305](CVE-2024/CVE-2024-203xx/CVE-2024-20305.json) (`2024-02-02T03:15:10.463`)
* [CVE-2024-22420](CVE-2024/CVE-2024-224xx/CVE-2024-22420.json) (`2024-02-02T03:15:10.977`)
* [CVE-2024-22421](CVE-2024/CVE-2024-224xx/CVE-2024-22421.json) (`2024-02-02T03:15:11.097`)
* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T04:58:55.817`)
* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T04:58:55.817`)
## Download and Usage