mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-02-02T05:00:24.708571+00:00
This commit is contained in:
parent
fa6bf666f1
commit
9b31c36363
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2001-0248",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-06-18T04:00:00.000",
|
||||
"lastModified": "2017-12-19T02:29:18.517",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:06:07.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -56,30 +78,25 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -98,20 +115,30 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.nai.com/research/covert/advisories/048.asp",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/2552",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6332",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2001-0249",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-06-18T04:00:00.000",
|
||||
"lastModified": "2018-10-30T16:26:22.763",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:06:01.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,38 +80,20 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B"
|
||||
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6"
|
||||
"criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"
|
||||
"criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5",
|
||||
"versionEndIncluding": "6.5.20",
|
||||
"matchCriteriaId": "24278E6E-AC94-4083-8838-41BF30D7D5F6"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -108,19 +112,29 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.nai.com/research/covert/advisories/048.asp",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/2550",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6332",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2001-0334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-06-27T04:00:00.000",
|
||||
"lastModified": "2018-10-12T21:30:20.860",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:06:11.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -70,11 +92,19 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-026",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6535",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-0184",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-05-16T04:00:00.000",
|
||||
"lastModified": "2021-04-01T12:58:43.567",
|
||||
"lastModified": "2024-02-02T03:05:54.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -91,6 +113,7 @@
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000475",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -98,8 +121,7 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=101974610509912&w=2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -107,7 +129,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -115,21 +137,21 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=102010164413135&w=2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2002/dsa-128",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -159,6 +181,7 @@
|
||||
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2040.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -174,6 +197,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-071.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -181,6 +205,7 @@
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-072.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -188,6 +213,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/4593",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-1347",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-18T05:00:00.000",
|
||||
"lastModified": "2017-07-11T01:29:13.960",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:05:42.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,9 +84,31 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cyrus:sasl:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:cyrusimap:cyrus_sasl:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.9",
|
||||
"matchCriteriaId": "FB40749C-6BC9-47A3-88BB-90995581C4E0"
|
||||
"matchCriteriaId": "5A309C1F-0137-4CCF-B438-1CE6719A547A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.3.8",
|
||||
"matchCriteriaId": "9290FC8C-8362-4595-A859-044D5FE848D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.3.8",
|
||||
"matchCriteriaId": "AB201A37-9EA9-46B4-A799-4DCC5326E88D"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,55 +118,106 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=103946297703402&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2002/dsa-215",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-283.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/advisories/4826",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/6347",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/6348",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/6349",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10810",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10811",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10812",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2004-0434",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-07-07T04:00:00.000",
|
||||
"lastModified": "2020-11-16T19:29:30.453",
|
||||
"lastModified": "2024-02-02T03:05:48.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -91,6 +113,7 @@
|
||||
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -98,6 +121,7 @@
|
||||
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -105,8 +129,7 @@
|
||||
"url": "http://marc.info/?l=bugtraq&m=108386148126457&w=2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -120,6 +143,7 @@
|
||||
"url": "http://www.debian.org/security/2004/dsa-504",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-0940",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-02-09T05:00:00.000",
|
||||
"lastModified": "2023-11-07T01:56:50.250",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:05:26.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -18,6 +18,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -51,7 +73,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,123 +87,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28EC1F94-04F3-490A-8324-1EB60EEBAD4B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30D94958-0D13-4076-B6F0-61D505136789"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B22DA22E-54DA-46CF-B3AE-4B0900D8086A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F90F496A-5D57-448F-A46F-E15F06CBFD01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89B58983-633F-4D20-80AE-8E7EB865CF83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:*",
|
||||
"matchCriteriaId": "34FD94C9-2352-4147-9BF2-A3CF841A159B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B6EE0E2-D608-4E72-A0E5-F407511405C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33FD6791-3B84-40CA-BCF4-B5637B172F2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DDD2F69-CFD4-4DEA-B43A-1337EEFA95A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A80B17D-FD66-40BD-9ADC-FE7A3944A696"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "713ADED4-CBE5-40C3-A128-99CFABF24560"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70FA0B8E-1A90-4939-871A-38B9E93BCCC1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83BDEAE5-29B9-48E3-93FA-F30832044C9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2720E06-1B0E-4BFE-8C85-A17E597BB151"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3EE1DECF-36C7-4968-8B7A-7A2034C2A957"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B67BD173-8517-4E97-BC65-D9657C63601A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B392A96F-FD2F-4073-8EED-EB31E1F20FE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E130104B-86F5-411E-8AC0-9B4B780BCA00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E62E621-74DA-4D99-A79C-AD2B85896A2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C577188-BD56-4571-A61A-1684DC9E9DD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B3A4CD9-1E96-4D3B-938D-F2D15855B0DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4058CE14-1CC8-42FD-A6BD-6869C1610E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0716E399-A5FE-4C49-BC48-CD97C03997A7"
|
||||
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.3",
|
||||
"versionEndIncluding": "1.3.32",
|
||||
"matchCriteriaId": "E48FC2F5-318B-4460-861D-80314B42F84B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -197,11 +106,6 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11F6E348-01DF-4FA4-808E-39A2A7A2B97B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D342447B-5233-45FD-B1CF-8D84921402AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -283,11 +187,6 @@
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
|
||||
"matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
|
||||
@ -311,92 +210,167 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=109906660225051&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/12898/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/19073",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1011783",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.apacheweek.com/features/security-13",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2004/dsa-594",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:134",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2004-600.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-816.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/11471",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2006/0789",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17785",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-0490",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-05-02T04:00:00.000",
|
||||
"lastModified": "2017-10-11T01:29:56.560",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:05:29.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,13 +80,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4848C3C8-432D-43E7-B0D9-8FD69D4C3B0F"
|
||||
"criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DEC10D0-622A-4037-9D4A-69814226CC6C"
|
||||
"criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -76,26 +98,31 @@
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=full-disclosure&m=110959085507755&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -103,36 +130,63 @@
|
||||
"url": "http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-340.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/12615",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/12616",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2005-4650",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:57:26.687",
|
||||
"lastModified": "2024-02-02T03:07:38.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -44,7 +44,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +58,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomla:joomla:1.03:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4E9C4B0-5B4B-4103-AA4E-419E08C22306"
|
||||
"criteria": "cpe:2.3:a:joomla:joomla\\!:1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC6A159A-7C68-41A3-A41E-5008D5F293EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,9 +67,30 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/17675",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.joomla.org/content/view/499/66/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/21041",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-3268",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-07-18T23:30:00.000",
|
||||
"lastModified": "2017-07-29T01:32:07.910",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:03:40.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -75,27 +97,51 @@
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=560",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26093",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1018401",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg24016347",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/24942",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2560",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www3.software.ibm.com/ibmdl/pub/software/tivoli_support/patches/patches_5.1.0/5.1.0-TIV-TPMOSD-FP0003/5.1.0-TIV-TPMOSD-FP0003.README.HTM",
|
||||
@ -106,7 +152,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35468",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-1700",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-04-08T18:05:00.000",
|
||||
"lastModified": "2017-08-08T01:30:22.713",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:07:30.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,18 +21,18 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 9.3
|
||||
"baseScore": 7.1
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 10.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -76,12 +76,17 @@
|
||||
"url": "http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41757",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-5180",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-11-20T15:30:00.390",
|
||||
"lastModified": "2017-09-29T01:32:29.867",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:07:25.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,33 +71,71 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32940",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.exploit-db.com/exploits/12079",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/39221",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1021294",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.voipshield.com/research-details.php?id=133",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46673",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57581",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/7262",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-2540",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-07-20T18:30:01.233",
|
||||
"lastModified": "2018-10-30T16:26:33.437",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:07:21.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,121 +65,6 @@
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "9.64",
|
||||
"matchCriteriaId": "25CB886F-4E01-4E01-ACF7-7CB90FA2A6D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -189,38 +74,71 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.exploit-db.com/exploits/9160",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52874",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5957",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-10003",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-01-27T17:59:00.180",
|
||||
"lastModified": "2017-02-28T02:37:35.973",
|
||||
"lastModified": "2024-02-02T03:03:55.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -84,223 +84,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0868B12-EDF9-42D9-BB43-15F623A3310B"
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.5.0.1",
|
||||
"versionEndExcluding": "3.5.23",
|
||||
"matchCriteriaId": "9AE6398D-3000-4C1B-8BB3-37AE280BEDD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F710949D-F0FE-43F4-ADB3-6EB679A70280"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCB75144-2437-40A8-8CA3-A487B603F7DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CED2CB3-BE78-4818-A6D7-847A1ACE74DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "705D8320-A278-483A-AE47-802044CE685E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "715634E1-F7BE-4106-BDA7-B7D147EEA800"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21E9E155-FC6F-46E7-8BF7-65DF097409D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF72FA7A-E35D-4000-9DDA-71E55EA3A4D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26A3F10F-938E-44D6-845D-B66EF9812C21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1D82EEE-F65E-4657-B0F7-6CE33D219134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9E6A845-B67C-4112-8240-9F61D6AF3B0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4BEDD7E3-E263-4A09-9C11-3E008E01BC28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80E3FF16-A6CD-456C-B58A-381A75D8616C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87D02AB2-AA26-4416-B689-02C5EEF2099C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A134E1F1-AFCC-498B-8840-5884CF858769"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5F4E7D0-B6F4-476E-A011-55619E91A3B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95588755-27E8-4DB7-B865-A784D3638FE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CD4DDBC-4243-459A-B43D-FF8F0AE0BA3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F90E11F-FC03-46D9-A9C4-A578196D59D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDC9BEE2-D7E4-4192-963C-E9F2364FC8CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA0BDDAD-2912-480F-8911-8FF94E1A7415"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "275C4ED9-0C69-4CFD-9C1D-D734731DD940"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "647A80E8-9AA4-41B4-B2F2-9D07D839DFEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC3EDC70-9DE3-454E-A90D-7D4A4C082517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E397BA5-4FA4-402F-BFCC-9077ED93C438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:3.5.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4649C5C3-7371-4B92-9E06-73AE4CF39685"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "060FCBEA-DEAA-42FB-88C9-4B78136B172F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "74987102-8CA8-4120-B686-F18579A96A46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA7828AA-48B6-44CD-8507-345A4F0A25BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6640F25F-CC8B-4B05-A97A-2186BD0B5ED8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A037F780-6FC9-4130-908F-B5434FA0C7DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DDEB455-F082-44E4-8CEA-019C0084BF05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49555803-288E-4B0A-B12A-890E5E0AD05F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBEE374C-365E-49DE-A9F9-6083044C774D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B6B2A8E-DD81-43CD-9F5B-E8F87498E513"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "179ACC3B-D8C8-4CE2-964F-CBF29BBB066A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "252E5ABE-5113-4987-931E-16B69C4CE424"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9285C454-7F60-4AEA-A134-124C1E0745FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F753944-8EC0-4CE5-98E5-71798F9EC663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1BD3131-D4F3-4B29-9408-754B6190DAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F00481A-5E3B-45A1-A2A5-56E63F91C834"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:4.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "217AB656-D70C-4009-8797-C58002FDB6C0"
|
||||
"criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.1",
|
||||
"versionEndExcluding": "4.0.17",
|
||||
"matchCriteriaId": "32C73B3C-ECDF-450E-A039-9F09A18570E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -321,6 +115,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/94953",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -329,6 +124,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1037512",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -337,7 +133,6 @@
|
||||
"url": "http://www.squid-cache.org/Advisories/SQUID-2016_10.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-1010006",
|
||||
"sourceIdentifier": "josh@bress.net",
|
||||
"published": "2019-07-15T02:15:10.370",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:07:20.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -94,6 +94,66 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -108,7 +168,11 @@
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00046.html",
|
||||
"source": "josh@bress.net"
|
||||
"source": "josh@bress.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.gnome.org/show_bug.cgi?id=788980",
|
||||
@ -121,23 +185,41 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00013.html",
|
||||
"source": "josh@bress.net"
|
||||
"source": "josh@bress.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00014.html",
|
||||
"source": "josh@bress.net"
|
||||
"source": "josh@bress.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/bugtraq/2020/Feb/18",
|
||||
"source": "josh@bress.net"
|
||||
"source": "josh@bress.net",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/4067-1/",
|
||||
"source": "josh@bress.net"
|
||||
"source": "josh@bress.net",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2020/dsa-4624",
|
||||
"source": "josh@bress.net"
|
||||
"source": "josh@bress.net",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-15811",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-09-02T17:15:11.687",
|
||||
"lastModified": "2023-11-07T03:17:55.657",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:04:21.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -211,8 +211,7 @@
|
||||
"url": "https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -225,15 +224,27 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210219-0007/",
|
||||
@ -253,6 +264,7 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210226-0007/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -274,6 +286,7 @@
|
||||
"url": "https://www.debian.org/security/2020/dsa-4751",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2021-30663",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-09-08T15:15:13.413",
|
||||
"lastModified": "2021-09-16T20:25:10.350",
|
||||
"lastModified": "2024-02-02T03:08:37.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Apple Safari Webkit Browser Engine Integer Overflow Vulnerability",
|
||||
"cisaVulnerabilityName": "Apple Multiple Products Integer Overflow Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-30860",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2021-08-24T19:15:14.370",
|
||||
"lastModified": "2023-11-07T03:33:34.353",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:08:54.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2021-11-17",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -199,63 +199,116 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/25",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/26",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/27",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/28",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/38",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/39",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/40",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Sep/50",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/09/02/11",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202209-21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212804",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212805",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212806",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT212807",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT212824",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-43537",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2021-12-08T22:15:09.620",
|
||||
"lastModified": "2022-12-09T15:19:17.787",
|
||||
"lastModified": "2024-02-02T03:05:31.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,7 +136,6 @@
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -174,6 +173,7 @@
|
||||
"url": "https://www.debian.org/security/2021/dsa-5026",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -181,6 +181,7 @@
|
||||
"url": "https://www.debian.org/security/2022/dsa-5034",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-0545",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2022-02-24T19:15:09.760",
|
||||
"lastModified": "2023-11-07T03:41:22.123",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:09:18.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -75,7 +75,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -142,6 +142,7 @@
|
||||
"url": "https://developer.blender.org/T94629",
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -150,6 +151,7 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html",
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
|
59
CVE-2022/CVE-2022-407xx/CVE-2022-40744.json
Normal file
59
CVE-2022/CVE-2022-407xx/CVE-2022-40744.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2022-40744",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T04:15:07.700",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236441."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236441",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7111778",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32333",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:16.323",
|
||||
"lastModified": "2024-02-02T02:15:16.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-380xx/CVE-2023-38019.json
Normal file
59
CVE-2023/CVE-2023-380xx/CVE-2023-38019.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-38019",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T04:15:07.937",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 260575."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260575",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7111679",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-380xx/CVE-2023-38020.json
Normal file
59
CVE-2023/CVE-2023-380xx/CVE-2023-38020.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-38020",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T04:15:08.147",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-117"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260576",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7111679",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-382xx/CVE-2023-38263.json
Normal file
59
CVE-2023/CVE-2023-382xx/CVE-2023-38263.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-38263",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T04:15:08.360",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 260577."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260577",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7111679",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40088",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.230",
|
||||
"lastModified": "2023-12-22T01:15:10.340",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:15:16.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,12 +90,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/5bfd817719fcf55cbb3476e6b5539a3db4c437fc",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40089",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.283",
|
||||
"lastModified": "2023-12-22T01:15:10.407",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:15:30.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,12 +70,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40090",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.337",
|
||||
"lastModified": "2023-12-22T01:15:10.473",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:15:34.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,12 +90,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40091",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.387",
|
||||
"lastModified": "2023-12-22T01:15:10.543",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:15:39.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,12 +90,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40092",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.440",
|
||||
"lastModified": "2023-12-22T01:15:10.613",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:15:44.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,12 +90,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/a5e55363e69b3c84d3f4011c7b428edb1a25752c",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40094",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.493",
|
||||
"lastModified": "2023-12-22T01:15:10.677",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:10:05.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,7 +90,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40095",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.547",
|
||||
"lastModified": "2023-12-22T01:15:10.740",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:09:57.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,12 +90,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40096",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.600",
|
||||
"lastModified": "2023-12-22T01:15:10.803",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:14:44.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,24 +90,37 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/148aeea373febc959c429f2cabd8323508c38ad8",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/av/+/5f401fc9f214789d691798620fea60015962370a",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/b0f6558fb36eb76df35c516ec5a65030a34a8734",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/native/+/9ddecd3d2b88de5ff7aa890d7ba9967c30d8b183",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40097",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.657",
|
||||
"lastModified": "2023-12-22T01:15:10.867",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:14:39.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,12 +85,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/apps/Launcher3/+/6c9a41117d5a9365cf34e770bbb00138f6bf997e",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40098",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.707",
|
||||
"lastModified": "2023-12-22T01:15:10.953",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:14:34.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,12 +85,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40103",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:24.757",
|
||||
"lastModified": "2023-12-22T01:15:11.020",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:14:29.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,20 +70,33 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/58fa254a5d1aee2206de90d5396c01e177483e3a",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/c3bc12c484ef3bbca4cec19234437c45af5e584d",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40462",
|
||||
"sourceIdentifier": "security@sierrawireless.com",
|
||||
"published": "2023-12-04T23:15:25.603",
|
||||
"lastModified": "2023-12-31T00:15:44.220",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:12:25.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -138,12 +138,31 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00024.html",
|
||||
"source": "security@sierrawireless.com"
|
||||
"source": "security@sierrawireless.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42882",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.280",
|
||||
"lastModified": "2024-01-12T16:15:51.933",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:10:11.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -72,7 +72,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42883",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.330",
|
||||
"lastModified": "2023-12-19T21:15:08.097",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:10:50.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -111,6 +111,26 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -164,7 +184,11 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/12/18/1",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214034",
|
||||
@ -216,7 +240,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5580",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42890",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.480",
|
||||
"lastModified": "2024-01-31T15:15:10.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-02-02T03:11:18.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -142,11 +142,18 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/12/18/1",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-33",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214035",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42894",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.587",
|
||||
"lastModified": "2023-12-13T01:15:08.533",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:11:25.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -86,15 +86,27 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214036",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42926",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:12.683",
|
||||
"lastModified": "2024-01-12T16:15:52.007",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:11:34.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,7 +72,11 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/9",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45773",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:26.440",
|
||||
"lastModified": "2023-12-22T01:15:11.080",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:13:12.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -75,12 +75,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45774",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:26.483",
|
||||
"lastModified": "2023-12-22T01:15:11.150",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:13:23.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,12 +90,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45775",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:26.530",
|
||||
"lastModified": "2023-12-22T01:15:11.220",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:13:30.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,12 +70,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45776",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:26.577",
|
||||
"lastModified": "2023-12-22T01:15:11.297",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:14:10.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,12 +70,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45777",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-12-04T23:15:26.623",
|
||||
"lastModified": "2023-12-22T01:15:11.367",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-02T03:14:19.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -75,16 +75,25 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/f4644b55d36a549710ba35b6fb797ba744807da6",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2023-12-01",
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
59
CVE-2023/CVE-2023-461xx/CVE-2023-46159.json
Normal file
59
CVE-2023/CVE-2023-461xx/CVE-2023-46159.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-46159",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T03:15:09.920",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW. IBM X-Force ID: 268906."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 2.6,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268906",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7112263",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:16.537",
|
||||
"lastModified": "2024-02-02T02:15:16.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46838",
|
||||
"sourceIdentifier": "security@xen.org",
|
||||
"published": "2024-01-29T11:15:07.933",
|
||||
"lastModified": "2024-02-02T02:06:40.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T03:15:10.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,6 +70,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/",
|
||||
"source": "security@xen.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/",
|
||||
"source": "security@xen.org"
|
||||
},
|
||||
{
|
||||
"url": "https://xenbits.xenproject.org/xsa/advisory-448.html",
|
||||
"source": "security@xen.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48792",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:16.590",
|
||||
"lastModified": "2024-02-02T02:15:16.590",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48793",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:16.637",
|
||||
"lastModified": "2024-02-02T02:15:16.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50328",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:16.683",
|
||||
"lastModified": "2024-02-02T02:15:16.683",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50934",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:16.890",
|
||||
"lastModified": "2024-02-02T02:15:16.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50935",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:17.087",
|
||||
"lastModified": "2024-02-02T02:15:17.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50938",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:17.277",
|
||||
"lastModified": "2024-02-02T02:15:17.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50941",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:17.467",
|
||||
"lastModified": "2024-02-02T02:15:17.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50962",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T02:15:17.667",
|
||||
"lastModified": "2024-02-02T02:15:17.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5156",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-25T16:15:15.613",
|
||||
"lastModified": "2023-12-15T18:18:02.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T04:15:08.577",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -165,6 +165,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-01",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=30884",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6246",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-31T14:15:48.420",
|
||||
"lastModified": "2024-02-01T06:15:53.180",
|
||||
"lastModified": "2024-02-02T04:15:08.713",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria en la funci\u00f3n __vsyslog_internal de la librer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando no se llam\u00f3 a la funci\u00f3n openlog, o se llam\u00f3 con el argumento ident establecido en NULL, y el nombre del programa (el nombre base de argv[0]) tiene m\u00e1s de 1024 bytes, lo que provoca un bloqueo de la aplicaci\u00f3n o una escalada de privilegios locales. Este problema afecta a glibc 2.36 y versiones posteriores."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -142,6 +146,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-01",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6779",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-31T14:15:48.700",
|
||||
"lastModified": "2024-02-01T06:15:53.350",
|
||||
"lastModified": "2024-02-02T04:15:08.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria de off-by-one en la funci\u00f3n __vsyslog_internal de la librer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando estas funciones se llaman con un mensaje mayor que INT_MAX bytes, lo que genera un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer para almacenar el mensaje, lo que provoca un bloqueo de la aplicaci\u00f3n. Este problema afecta a glibc 2.37 y posteriores."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -67,6 +71,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-01",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6780",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-31T14:15:48.917",
|
||||
"lastModified": "2024-02-01T06:15:53.443",
|
||||
"lastModified": "2024-02-02T04:15:08.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 un desbordamiento de enteros en la funci\u00f3n __vsyslog_internal de la liibrer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando estas funciones se llaman con un mensaje muy largo, lo que genera un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer para almacenar el mensaje, lo que genera un comportamiento indefinido. Este problema afecta a glibc 2.37 y posteriores."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -67,6 +71,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-01",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/01/30/6",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1059",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-01-30T22:15:52.937",
|
||||
"lastModified": "2024-01-31T14:05:27.507",
|
||||
"lastModified": "2024-02-02T03:15:10.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1514777",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1060",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-01-30T22:15:53.000",
|
||||
"lastModified": "2024-01-31T14:05:27.507",
|
||||
"lastModified": "2024-02-02T03:15:10.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1511567",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1077",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-01-30T22:15:53.090",
|
||||
"lastModified": "2024-01-31T14:05:27.507",
|
||||
"lastModified": "2024-02-02T03:15:10.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,10 @@
|
||||
{
|
||||
"url": "https://crbug.com/1511085",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-20305",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-01-26T18:15:11.350",
|
||||
"lastModified": "2024-02-01T21:14:41.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T03:15:10.463",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -68,6 +68,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
59
CVE-2024/CVE-2024-223xx/CVE-2024-22319.json
Normal file
59
CVE-2024/CVE-2024-223xx/CVE-2024-22319.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-22319",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T03:15:10.573",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote attacker to conduct an LDAP injection. By sending a request with a specially crafted request, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter. IBM X-Force ID: 279145."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-90"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279145",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7112382",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-223xx/CVE-2024-22320.json
Normal file
59
CVE-2024/CVE-2024-223xx/CVE-2024-22320.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-22320",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T03:15:10.780",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279146",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7112382",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22420",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-01-19T21:15:09.667",
|
||||
"lastModified": "2024-01-26T20:12:04.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T03:15:10.977",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22421",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-01-19T21:15:09.870",
|
||||
"lastModified": "2024-01-26T20:15:23.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-02T03:15:11.097",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-225xx/CVE-2024-22533.json
Normal file
20
CVE-2024/CVE-2024-225xx/CVE-2024-22533.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-22533",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T03:15:11.210",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/xiandafu/beetl/issues/I8RU01",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22779",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:17.890",
|
||||
"lastModified": "2024-02-02T02:15:17.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22899",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:18.073",
|
||||
"lastModified": "2024-02-02T02:15:18.073",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22900",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:18.127",
|
||||
"lastModified": "2024-02-02T02:15:18.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:18.177",
|
||||
"lastModified": "2024-02-02T02:15:18.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22902",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:18.223",
|
||||
"lastModified": "2024-02-02T02:15:18.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-22903",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:18.277",
|
||||
"lastModified": "2024-02-02T02:15:18.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23746",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:18.330",
|
||||
"lastModified": "2024-02-02T02:15:18.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-02T04:58:55.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
92
README.md
92
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-02T03:00:57.302409+00:00
|
||||
2024-02-02T05:00:24.708571+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-02T02:59:48.153000+00:00
|
||||
2024-02-02T04:58:55.817000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,68 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
237371
|
||||
237379
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
* [CVE-2023-50326](CVE-2023/CVE-2023-503xx/CVE-2023-50326.json) (`2024-02-02T01:15:07.710`)
|
||||
* [CVE-2023-50327](CVE-2023/CVE-2023-503xx/CVE-2023-50327.json) (`2024-02-02T01:15:07.937`)
|
||||
* [CVE-2023-50933](CVE-2023/CVE-2023-509xx/CVE-2023-50933.json) (`2024-02-02T01:15:08.140`)
|
||||
* [CVE-2023-50936](CVE-2023/CVE-2023-509xx/CVE-2023-50936.json) (`2024-02-02T01:15:08.310`)
|
||||
* [CVE-2023-50937](CVE-2023/CVE-2023-509xx/CVE-2023-50937.json) (`2024-02-02T01:15:08.520`)
|
||||
* [CVE-2023-50940](CVE-2023/CVE-2023-509xx/CVE-2023-50940.json) (`2024-02-02T01:15:08.753`)
|
||||
* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T02:15:16.323`)
|
||||
* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T02:15:16.537`)
|
||||
* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T02:15:16.590`)
|
||||
* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T02:15:16.637`)
|
||||
* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T02:15:16.683`)
|
||||
* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T02:15:16.890`)
|
||||
* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T02:15:17.087`)
|
||||
* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T02:15:17.277`)
|
||||
* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T02:15:17.467`)
|
||||
* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T02:15:17.667`)
|
||||
* [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-02-02T01:15:08.970`)
|
||||
* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T02:15:17.890`)
|
||||
* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T02:15:18.073`)
|
||||
* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T02:15:18.127`)
|
||||
* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T02:15:18.177`)
|
||||
* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T02:15:18.223`)
|
||||
* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T02:15:18.277`)
|
||||
* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T02:15:18.330`)
|
||||
* [CVE-2022-40744](CVE-2022/CVE-2022-407xx/CVE-2022-40744.json) (`2024-02-02T04:15:07.700`)
|
||||
* [CVE-2023-46159](CVE-2023/CVE-2023-461xx/CVE-2023-46159.json) (`2024-02-02T03:15:09.920`)
|
||||
* [CVE-2023-38019](CVE-2023/CVE-2023-380xx/CVE-2023-38019.json) (`2024-02-02T04:15:07.937`)
|
||||
* [CVE-2023-38020](CVE-2023/CVE-2023-380xx/CVE-2023-38020.json) (`2024-02-02T04:15:08.147`)
|
||||
* [CVE-2023-38263](CVE-2023/CVE-2023-382xx/CVE-2023-38263.json) (`2024-02-02T04:15:08.360`)
|
||||
* [CVE-2024-22319](CVE-2024/CVE-2024-223xx/CVE-2024-22319.json) (`2024-02-02T03:15:10.573`)
|
||||
* [CVE-2024-22320](CVE-2024/CVE-2024-223xx/CVE-2024-22320.json) (`2024-02-02T03:15:10.780`)
|
||||
* [CVE-2024-22533](CVE-2024/CVE-2024-225xx/CVE-2024-22533.json) (`2024-02-02T03:15:11.210`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `94`
|
||||
Recently modified CVEs: `70`
|
||||
|
||||
* [CVE-2024-23033](CVE-2024/CVE-2024-230xx/CVE-2024-23033.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-23034](CVE-2024/CVE-2024-230xx/CVE-2024-23034.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-24756](CVE-2024/CVE-2024-247xx/CVE-2024-24756.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-21764](CVE-2024/CVE-2024-217xx/CVE-2024-21764.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-21794](CVE-2024/CVE-2024-217xx/CVE-2024-21794.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-21866](CVE-2024/CVE-2024-218xx/CVE-2024-21866.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-21869](CVE-2024/CVE-2024-218xx/CVE-2024-21869.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-22016](CVE-2024/CVE-2024-220xx/CVE-2024-22016.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-22096](CVE-2024/CVE-2024-220xx/CVE-2024-22096.json) (`2024-02-02T01:57:57.640`)
|
||||
* [CVE-2024-21852](CVE-2024/CVE-2024-218xx/CVE-2024-21852.json) (`2024-02-02T01:58:03.307`)
|
||||
* [CVE-2024-23747](CVE-2024/CVE-2024-237xx/CVE-2024-23747.json) (`2024-02-02T02:03:39.093`)
|
||||
* [CVE-2024-22559](CVE-2024/CVE-2024-225xx/CVE-2024-22559.json) (`2024-02-02T02:03:48.573`)
|
||||
* [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-02-02T02:04:13.267`)
|
||||
* [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-02-02T02:05:39.277`)
|
||||
* [CVE-2024-23791](CVE-2024/CVE-2024-237xx/CVE-2024-23791.json) (`2024-02-02T02:07:28.850`)
|
||||
* [CVE-2024-23792](CVE-2024/CVE-2024-237xx/CVE-2024-23792.json) (`2024-02-02T02:07:40.577`)
|
||||
* [CVE-2024-23790](CVE-2024/CVE-2024-237xx/CVE-2024-23790.json) (`2024-02-02T02:07:58.653`)
|
||||
* [CVE-2024-0212](CVE-2024/CVE-2024-02xx/CVE-2024-0212.json) (`2024-02-02T02:08:12.603`)
|
||||
* [CVE-2024-24736](CVE-2024/CVE-2024-247xx/CVE-2024-24736.json) (`2024-02-02T02:08:23.417`)
|
||||
* [CVE-2024-0959](CVE-2024/CVE-2024-09xx/CVE-2024-0959.json) (`2024-02-02T02:18:46.160`)
|
||||
* [CVE-2024-0960](CVE-2024/CVE-2024-09xx/CVE-2024-0960.json) (`2024-02-02T02:19:05.557`)
|
||||
* [CVE-2024-0962](CVE-2024/CVE-2024-09xx/CVE-2024-0962.json) (`2024-02-02T02:19:44.257`)
|
||||
* [CVE-2024-0958](CVE-2024/CVE-2024-09xx/CVE-2024-0958.json) (`2024-02-02T02:20:21.333`)
|
||||
* [CVE-2024-0470](CVE-2024/CVE-2024-04xx/CVE-2024-0470.json) (`2024-02-02T02:47:35.793`)
|
||||
* [CVE-2024-0471](CVE-2024/CVE-2024-04xx/CVE-2024-0471.json) (`2024-02-02T02:48:16.190`)
|
||||
* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-02T04:15:08.813`)
|
||||
* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-02-02T04:15:08.907`)
|
||||
* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-1059](CVE-2024/CVE-2024-10xx/CVE-2024-1059.json) (`2024-02-02T03:15:10.207`)
|
||||
* [CVE-2024-1060](CVE-2024/CVE-2024-10xx/CVE-2024-1060.json) (`2024-02-02T03:15:10.313`)
|
||||
* [CVE-2024-1077](CVE-2024/CVE-2024-10xx/CVE-2024-1077.json) (`2024-02-02T03:15:10.417`)
|
||||
* [CVE-2024-20305](CVE-2024/CVE-2024-203xx/CVE-2024-20305.json) (`2024-02-02T03:15:10.463`)
|
||||
* [CVE-2024-22420](CVE-2024/CVE-2024-224xx/CVE-2024-22420.json) (`2024-02-02T03:15:10.977`)
|
||||
* [CVE-2024-22421](CVE-2024/CVE-2024-224xx/CVE-2024-22421.json) (`2024-02-02T03:15:11.097`)
|
||||
* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T04:58:55.817`)
|
||||
* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T04:58:55.817`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user