From 9b31c36363a56b80304026df1100e7739e28ec2e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 2 Feb 2024 05:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-02-02T05:00:24.708571+00:00 --- CVE-2001/CVE-2001-02xx/CVE-2001-0248.json | 77 +++-- CVE-2001/CVE-2001-02xx/CVE-2001-0249.json | 76 +++-- CVE-2001/CVE-2001-03xx/CVE-2001-0334.json | 40 ++- CVE-2002/CVE-2002-01xx/CVE-2002-0184.json | 42 ++- CVE-2002/CVE-2002-13xx/CVE-2002-1347.json | 131 +++++++-- CVE-2004/CVE-2004-04xx/CVE-2004-0434.json | 32 +- CVE-2004/CVE-2004-09xx/CVE-2004-0940.json | 274 ++++++++---------- CVE-2005/CVE-2005-04xx/CVE-2005-0490.json | 88 ++++-- CVE-2005/CVE-2005-46xx/CVE-2005-4650.json | 31 +- CVE-2007/CVE-2007-32xx/CVE-2007-3268.json | 64 +++- CVE-2008/CVE-2008-17xx/CVE-2008-1700.json | 23 +- CVE-2008/CVE-2008-51xx/CVE-2008-5180.json | 58 +++- CVE-2009/CVE-2009-25xx/CVE-2009-2540.json | 168 +++-------- CVE-2016/CVE-2016-100xx/CVE-2016-10003.json | 235 +-------------- .../CVE-2019-10100xx/CVE-2019-1010006.json | 104 ++++++- CVE-2020/CVE-2020-158xx/CVE-2020-15811.json | 29 +- CVE-2021/CVE-2021-306xx/CVE-2021-30663.json | 4 +- CVE-2021/CVE-2021-308xx/CVE-2021-30860.json | 87 ++++-- CVE-2021/CVE-2021-435xx/CVE-2021-43537.json | 5 +- CVE-2022/CVE-2022-05xx/CVE-2022-0545.json | 8 +- CVE-2022/CVE-2022-407xx/CVE-2022-40744.json | 59 ++++ CVE-2023/CVE-2023-323xx/CVE-2023-32333.json | 4 +- CVE-2023/CVE-2023-380xx/CVE-2023-38019.json | 59 ++++ CVE-2023/CVE-2023-380xx/CVE-2023-38020.json | 59 ++++ CVE-2023/CVE-2023-382xx/CVE-2023-38263.json | 59 ++++ CVE-2023/CVE-2023-400xx/CVE-2023-40088.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40089.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40090.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40091.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40092.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40094.json | 10 +- CVE-2023/CVE-2023-400xx/CVE-2023-40095.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40096.json | 25 +- CVE-2023/CVE-2023-400xx/CVE-2023-40097.json | 11 +- CVE-2023/CVE-2023-400xx/CVE-2023-40098.json | 11 +- CVE-2023/CVE-2023-401xx/CVE-2023-40103.json | 23 +- CVE-2023/CVE-2023-404xx/CVE-2023-40462.json | 25 +- CVE-2023/CVE-2023-428xx/CVE-2023-42882.json | 12 +- CVE-2023/CVE-2023-428xx/CVE-2023-42883.json | 36 ++- CVE-2023/CVE-2023-428xx/CVE-2023-42890.json | 15 +- CVE-2023/CVE-2023-428xx/CVE-2023-42894.json | 22 +- CVE-2023/CVE-2023-429xx/CVE-2023-42926.json | 10 +- CVE-2023/CVE-2023-457xx/CVE-2023-45773.json | 11 +- CVE-2023/CVE-2023-457xx/CVE-2023-45774.json | 11 +- CVE-2023/CVE-2023-457xx/CVE-2023-45775.json | 11 +- CVE-2023/CVE-2023-457xx/CVE-2023-45776.json | 11 +- CVE-2023/CVE-2023-457xx/CVE-2023-45777.json | 17 +- CVE-2023/CVE-2023-461xx/CVE-2023-46159.json | 59 ++++ CVE-2023/CVE-2023-463xx/CVE-2023-46344.json | 4 +- CVE-2023/CVE-2023-468xx/CVE-2023-46838.json | 12 +- CVE-2023/CVE-2023-487xx/CVE-2023-48792.json | 4 +- CVE-2023/CVE-2023-487xx/CVE-2023-48793.json | 4 +- CVE-2023/CVE-2023-503xx/CVE-2023-50328.json | 4 +- CVE-2023/CVE-2023-509xx/CVE-2023-50934.json | 4 +- CVE-2023/CVE-2023-509xx/CVE-2023-50935.json | 4 +- CVE-2023/CVE-2023-509xx/CVE-2023-50938.json | 4 +- CVE-2023/CVE-2023-509xx/CVE-2023-50941.json | 4 +- CVE-2023/CVE-2023-509xx/CVE-2023-50962.json | 4 +- CVE-2023/CVE-2023-51xx/CVE-2023-5156.json | 8 +- CVE-2023/CVE-2023-62xx/CVE-2023-6246.json | 10 +- CVE-2023/CVE-2023-67xx/CVE-2023-6779.json | 10 +- CVE-2023/CVE-2023-67xx/CVE-2023-6780.json | 10 +- CVE-2024/CVE-2024-10xx/CVE-2024-1059.json | 6 +- CVE-2024/CVE-2024-10xx/CVE-2024-1060.json | 6 +- CVE-2024/CVE-2024-10xx/CVE-2024-1077.json | 6 +- CVE-2024/CVE-2024-203xx/CVE-2024-20305.json | 16 +- CVE-2024/CVE-2024-223xx/CVE-2024-22319.json | 59 ++++ CVE-2024/CVE-2024-223xx/CVE-2024-22320.json | 59 ++++ CVE-2024/CVE-2024-224xx/CVE-2024-22420.json | 8 +- CVE-2024/CVE-2024-224xx/CVE-2024-22421.json | 8 +- CVE-2024/CVE-2024-225xx/CVE-2024-22533.json | 20 ++ CVE-2024/CVE-2024-227xx/CVE-2024-22779.json | 4 +- CVE-2024/CVE-2024-228xx/CVE-2024-22899.json | 4 +- CVE-2024/CVE-2024-229xx/CVE-2024-22900.json | 4 +- CVE-2024/CVE-2024-229xx/CVE-2024-22901.json | 4 +- CVE-2024/CVE-2024-229xx/CVE-2024-22902.json | 4 +- CVE-2024/CVE-2024-229xx/CVE-2024-22903.json | 4 +- CVE-2024/CVE-2024-237xx/CVE-2024-23746.json | 4 +- README.md | 92 +++--- 79 files changed, 1737 insertions(+), 859 deletions(-) create mode 100644 CVE-2022/CVE-2022-407xx/CVE-2022-40744.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38019.json create mode 100644 CVE-2023/CVE-2023-380xx/CVE-2023-38020.json create mode 100644 CVE-2023/CVE-2023-382xx/CVE-2023-38263.json create mode 100644 CVE-2023/CVE-2023-461xx/CVE-2023-46159.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22319.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22320.json create mode 100644 CVE-2024/CVE-2024-225xx/CVE-2024-22533.json diff --git a/CVE-2001/CVE-2001-02xx/CVE-2001-0248.json b/CVE-2001/CVE-2001-02xx/CVE-2001-0248.json index 3ffb3df4c6d..3065f8ab5f2 100644 --- a/CVE-2001/CVE-2001-02xx/CVE-2001-0248.json +++ b/CVE-2001/CVE-2001-02xx/CVE-2001-0248.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0248", "sourceIdentifier": "cve@mitre.org", "published": "2001-06-18T04:00:00.000", - "lastModified": "2017-12-19T02:29:18.517", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:06:07.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-131" } ] } @@ -56,30 +78,25 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", - "matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", - "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", - "matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7" } ] } @@ -98,20 +115,30 @@ }, { "url": "http://www.nai.com/research/covert/advisories/048.asp", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/2552", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6332", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-02xx/CVE-2001-0249.json b/CVE-2001/CVE-2001-02xx/CVE-2001-0249.json index 4bbf499941b..4e5f69a2ab0 100644 --- a/CVE-2001/CVE-2001-02xx/CVE-2001-0249.json +++ b/CVE-2001/CVE-2001-02xx/CVE-2001-0249.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0249", "sourceIdentifier": "cve@mitre.org", "published": "2001-06-18T04:00:00.000", - "lastModified": "2018-10-30T16:26:22.763", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:06:01.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-131" } ] } @@ -58,38 +80,20 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B" + "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", + "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6" + "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", + "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224" + "criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndIncluding": "6.5.20", + "matchCriteriaId": "24278E6E-AC94-4083-8838-41BF30D7D5F6" } ] } @@ -108,19 +112,29 @@ }, { "url": "http://www.nai.com/research/covert/advisories/048.asp", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/2550", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6332", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-03xx/CVE-2001-0334.json b/CVE-2001/CVE-2001-03xx/CVE-2001-0334.json index a9cf2fa8581..b0ce52cb5d9 100644 --- a/CVE-2001/CVE-2001-03xx/CVE-2001-0334.json +++ b/CVE-2001/CVE-2001-03xx/CVE-2001-0334.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0334", "sourceIdentifier": "cve@mitre.org", "published": "2001-06-27T04:00:00.000", - "lastModified": "2018-10-12T21:30:20.860", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:06:11.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-131" } ] } @@ -70,11 +92,19 @@ "references": [ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-026", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6535", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-01xx/CVE-2002-0184.json b/CVE-2002/CVE-2002-01xx/CVE-2002-0184.json index 4140de6a506..d46c847c378 100644 --- a/CVE-2002/CVE-2002-01xx/CVE-2002-0184.json +++ b/CVE-2002/CVE-2002-01xx/CVE-2002-0184.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0184", "sourceIdentifier": "cve@mitre.org", "published": "2002-05-16T04:00:00.000", - "lastModified": "2021-04-01T12:58:43.567", + "lastModified": "2024-02-02T03:05:54.737", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-131" } ] } @@ -91,6 +113,7 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000475", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -98,8 +121,7 @@ "url": "http://marc.info/?l=bugtraq&m=101974610509912&w=2", "source": "cve@mitre.org", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -107,7 +129,7 @@ "source": "cve@mitre.org", "tags": [ "Mailing List", - "Third Party Advisory" + "Patch" ] }, { @@ -115,21 +137,21 @@ "source": "cve@mitre.org", "tags": [ "Mailing List", - "Third Party Advisory" + "Patch" ] }, { "url": "http://marc.info/?l=bugtraq&m=102010164413135&w=2", "source": "cve@mitre.org", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "http://www.debian.org/security/2002/dsa-128", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -159,6 +181,7 @@ "url": "http://www.linuxsecurity.com/advisories/other_advisory-2040.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -174,6 +197,7 @@ "url": "http://www.redhat.com/support/errata/RHSA-2002-071.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -181,6 +205,7 @@ "url": "http://www.redhat.com/support/errata/RHSA-2002-072.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -188,6 +213,7 @@ "url": "http://www.securityfocus.com/bid/4593", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2002/CVE-2002-13xx/CVE-2002-1347.json b/CVE-2002/CVE-2002-13xx/CVE-2002-1347.json index e60932d15aa..b0cb662a9ac 100644 --- a/CVE-2002/CVE-2002-13xx/CVE-2002-1347.json +++ b/CVE-2002/CVE-2002-13xx/CVE-2002-1347.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1347", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-18T05:00:00.000", - "lastModified": "2017-07-11T01:29:13.960", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:05:42.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-131" } ] } @@ -62,9 +84,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cyrus:sasl:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:cyrusimap:cyrus_sasl:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.1.9", - "matchCriteriaId": "FB40749C-6BC9-47A3-88BB-90995581C4E0" + "matchCriteriaId": "5A309C1F-0137-4CCF-B438-1CE6719A547A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.3.8", + "matchCriteriaId": "9290FC8C-8362-4595-A859-044D5FE848D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.3.8", + "matchCriteriaId": "AB201A37-9EA9-46B4-A799-4DCC5326E88D" } ] } @@ -74,55 +118,106 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=103946297703402&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://www.debian.org/security/2002/dsa-215", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-283.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/advisories/4826", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/6347", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/6348", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/6349", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10810", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10811", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10812", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-04xx/CVE-2004-0434.json b/CVE-2004/CVE-2004-04xx/CVE-2004-0434.json index 519977046b2..58fa86192b7 100644 --- a/CVE-2004/CVE-2004-04xx/CVE-2004-0434.json +++ b/CVE-2004/CVE-2004-04xx/CVE-2004-0434.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0434", "sourceIdentifier": "cve@mitre.org", "published": "2004-07-07T04:00:00.000", - "lastModified": "2020-11-16T19:29:30.453", + "lastModified": "2024-02-02T03:05:48.270", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-131" } ] } @@ -91,6 +113,7 @@ "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -98,6 +121,7 @@ "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -105,8 +129,7 @@ "url": "http://marc.info/?l=bugtraq&m=108386148126457&w=2", "source": "cve@mitre.org", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -120,6 +143,7 @@ "url": "http://www.debian.org/security/2004/dsa-504", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Third Party Advisory" ] diff --git a/CVE-2004/CVE-2004-09xx/CVE-2004-0940.json b/CVE-2004/CVE-2004-09xx/CVE-2004-0940.json index f1c455b78be..d59dddac29c 100644 --- a/CVE-2004/CVE-2004-09xx/CVE-2004-0940.json +++ b/CVE-2004/CVE-2004-09xx/CVE-2004-0940.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0940", "sourceIdentifier": "cve@mitre.org", "published": "2005-02-09T05:00:00.000", - "lastModified": "2023-11-07T01:56:50.250", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:05:26.170", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -18,6 +18,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,7 +73,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-131" } ] } @@ -65,123 +87,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "28EC1F94-04F3-490A-8324-1EB60EEBAD4B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "30D94958-0D13-4076-B6F0-61D505136789" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B22DA22E-54DA-46CF-B3AE-4B0900D8086A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F90F496A-5D57-448F-A46F-E15F06CBFD01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "89B58983-633F-4D20-80AE-8E7EB865CF83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:*", - "matchCriteriaId": "34FD94C9-2352-4147-9BF2-A3CF841A159B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*", - "matchCriteriaId": "19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "7B6EE0E2-D608-4E72-A0E5-F407511405C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD6791-3B84-40CA-BCF4-B5637B172F2A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*", - "matchCriteriaId": "6DDD2F69-CFD4-4DEA-B43A-1337EEFA95A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*", - "matchCriteriaId": "0A80B17D-FD66-40BD-9ADC-FE7A3944A696" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*", - "matchCriteriaId": "713ADED4-CBE5-40C3-A128-99CFABF24560" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*", - "matchCriteriaId": "70FA0B8E-1A90-4939-871A-38B9E93BCCC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*", - "matchCriteriaId": "83BDEAE5-29B9-48E3-93FA-F30832044C9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*", - "matchCriteriaId": "A2720E06-1B0E-4BFE-8C85-A17E597BB151" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*", - "matchCriteriaId": "3EE1DECF-36C7-4968-8B7A-7A2034C2A957" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*", - "matchCriteriaId": "B67BD173-8517-4E97-BC65-D9657C63601A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*", - "matchCriteriaId": "B392A96F-FD2F-4073-8EED-EB31E1F20FE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*", - "matchCriteriaId": "E130104B-86F5-411E-8AC0-9B4B780BCA00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*", - "matchCriteriaId": "0E62E621-74DA-4D99-A79C-AD2B85896A2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*", - "matchCriteriaId": "2C577188-BD56-4571-A61A-1684DC9E9DD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*", - "matchCriteriaId": "5B3A4CD9-1E96-4D3B-938D-F2D15855B0DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*", - "matchCriteriaId": "4058CE14-1CC8-42FD-A6BD-6869C1610E57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*", - "matchCriteriaId": "0716E399-A5FE-4C49-BC48-CD97C03997A7" + "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3", + "versionEndIncluding": "1.3.32", + "matchCriteriaId": "E48FC2F5-318B-4460-861D-80314B42F84B" }, { "vulnerable": true, @@ -197,11 +106,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "11F6E348-01DF-4FA4-808E-39A2A7A2B97B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", - "matchCriteriaId": "D342447B-5233-45FD-B1CF-8D84921402AD" } ] } @@ -283,11 +187,6 @@ "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", - "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", @@ -311,92 +210,167 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=109906660225051&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://secunia.com/advisories/12898/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/19073", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1011783", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.apacheweek.com/features/security-13", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://www.debian.org/security/2004/dsa-594", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:134", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-600.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/11471", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2006/0789", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17785", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-04xx/CVE-2005-0490.json b/CVE-2005/CVE-2005-04xx/CVE-2005-0490.json index b702c6b069b..88df2d2b26e 100644 --- a/CVE-2005/CVE-2005-04xx/CVE-2005-0490.json +++ b/CVE-2005/CVE-2005-04xx/CVE-2005-0490.json @@ -2,8 +2,8 @@ "id": "CVE-2005-0490", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:56.560", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:05:29.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-131" } ] } @@ -58,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4848C3C8-432D-43E7-B0D9-8FD69D4C3B0F" + "criteria": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EFE80B46-33F0-4338-AF37-9E7E31FC5E83" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0DEC10D0-622A-4037-9D4A-69814226CC6C" + "criteria": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "06E3CB14-FB16-4F4E-9AD9-A02DC727FF6D" } ] } @@ -76,26 +98,31 @@ "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://marc.info/?l=full-disclosure&m=110959085507755&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Third Party Advisory" ] }, { "url": "http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -103,36 +130,63 @@ "url": "http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/12615", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/12616", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json b/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json index e357da32fdf..91819f71109 100644 --- a/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json +++ b/CVE-2005/CVE-2005-46xx/CVE-2005-4650.json @@ -2,7 +2,7 @@ "id": "CVE-2005-4650", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:57:26.687", + "lastModified": "2024-02-02T03:07:38.527", "vulnStatus": "Analyzed", "descriptions": [ { @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-770" } ] } @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:joomla:joomla:1.03:*:*:*:*:*:*:*", - "matchCriteriaId": "A4E9C4B0-5B4B-4103-AA4E-419E08C22306" + "criteria": "cpe:2.3:a:joomla:joomla\\!:1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BC6A159A-7C68-41A3-A41E-5008D5F293EA" } ] } @@ -67,9 +67,30 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/17675", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.joomla.org/content/view/499/66/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Product" + ] + }, + { + "url": "http://www.osvdb.org/21041", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-32xx/CVE-2007-3268.json b/CVE-2007/CVE-2007-32xx/CVE-2007-3268.json index 95ea37cf687..3bb18edf5f5 100644 --- a/CVE-2007/CVE-2007-32xx/CVE-2007-3268.json +++ b/CVE-2007/CVE-2007-32xx/CVE-2007-3268.json @@ -2,8 +2,8 @@ "id": "CVE-2007-3268", "sourceIdentifier": "cve@mitre.org", "published": "2007-07-18T23:30:00.000", - "lastModified": "2017-07-29T01:32:07.910", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:03:40.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-369" } ] } @@ -75,27 +97,51 @@ "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=560", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/26093", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1018401", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www-1.ibm.com/support/docview.wss?uid=swg24016347", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://www.securityfocus.com/bid/24942", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/2560", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www3.software.ibm.com/ibmdl/pub/software/tivoli_support/patches/patches_5.1.0/5.1.0-TIV-TPMOSD-FP0003/5.1.0-TIV-TPMOSD-FP0003.README.HTM", @@ -106,7 +152,11 @@ }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35468", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-17xx/CVE-2008-1700.json b/CVE-2008/CVE-2008-17xx/CVE-2008-1700.json index ac927796c60..a09c0047ba0 100644 --- a/CVE-2008/CVE-2008-17xx/CVE-2008-1700.json +++ b/CVE-2008/CVE-2008-17xx/CVE-2008-1700.json @@ -2,8 +2,8 @@ "id": "CVE-2008-1700", "sourceIdentifier": "cve@mitre.org", "published": "2008-04-08T18:05:00.000", - "lastModified": "2017-08-08T01:30:22.713", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:07:30.643", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,18 +21,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", - "confidentialityImpact": "COMPLETE", - "integrityImpact": "COMPLETE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "baseScore": 7.1 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, - "impactScore": 10.0, + "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-770" } ] } @@ -76,12 +76,17 @@ "url": "http://www.mwrinfosecurity.com/publications/mwri_interwoven-worksite-activex-control-remote-code-execution_2008-03-10.pdf", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41757", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-51xx/CVE-2008-5180.json b/CVE-2008/CVE-2008-51xx/CVE-2008-5180.json index abc38bff9c9..322b72bed67 100644 --- a/CVE-2008/CVE-2008-51xx/CVE-2008-5180.json +++ b/CVE-2008/CVE-2008-51xx/CVE-2008-5180.json @@ -2,8 +2,8 @@ "id": "CVE-2008-5180", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-20T15:30:00.390", - "lastModified": "2017-09-29T01:32:29.867", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:07:25.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-770" } ] } @@ -71,33 +71,71 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/32940", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.exploit-db.com/exploits/12079", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/39221", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1021294", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.voipshield.com/research-details.php?id=133", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46673", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57581", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/7262", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-25xx/CVE-2009-2540.json b/CVE-2009/CVE-2009-25xx/CVE-2009-2540.json index 380c667f630..5be430e0368 100644 --- a/CVE-2009/CVE-2009-25xx/CVE-2009-2540.json +++ b/CVE-2009/CVE-2009-25xx/CVE-2009-2540.json @@ -2,8 +2,8 @@ "id": "CVE-2009-2540", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-20T18:30:01.233", - "lastModified": "2018-10-30T16:26:33.437", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:07:21.203", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-770" } ] } @@ -65,121 +65,6 @@ "criteria": "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*", "versionEndIncluding": "9.64", "matchCriteriaId": "25CB886F-4E01-4E01-ACF7-7CB90FA2A6D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7C35850-B79C-4EE4-A6F2-CC5D2304724B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*", - "matchCriteriaId": "A8F6644C-97E6-4023-9C5C-5C1E1B0B55D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*", - "matchCriteriaId": "D7965089-8592-47F2-958B-7DBE669BCAC9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*", - "matchCriteriaId": "E1750B2D-7AC8-45CF-9879-1D0476EEE86C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*", - "matchCriteriaId": "ECEE4473-88C0-4E28-A5B5-F7383B0E5558" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "76410AD4-78CA-48EA-83F0-099D0A49626F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*", - "matchCriteriaId": "9DF2B21F-7E97-416B-AF5C-35338A254552" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*", - "matchCriteriaId": "DBAC41D6-73D4-44E9-87E4-E1E955B9580A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*", - "matchCriteriaId": "52FCCB1C-165C-49FF-B70B-475B37BDF02A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*", - "matchCriteriaId": "4FA5A5E5-3703-44AC-9963-A20A55002B48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*", - "matchCriteriaId": "DC3E5BEF-3F29-4929-A37C-C49322B19047" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*", - "matchCriteriaId": "7B0E7B5D-2568-4128-8F99-E74D24A7E991" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*", - "matchCriteriaId": "E6A04906-7267-4A09-87BF-D639C7CF315B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BEA17D3F-A17B-47A6-8066-583F63D11468" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*", - "matchCriteriaId": "ED63C1B5-F52D-4C70-82D3-B427EAF5CF4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*", - "matchCriteriaId": "98E48C83-01AE-4A33-A004-14B99792674C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B56A2B78-70BD-439B-B1ED-A17FA5EF0990" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*", - "matchCriteriaId": "623E4466-82CC-4BDD-BE25-3BB33B585547" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*", - "matchCriteriaId": "8F90E537-5A0F-4302-9CC3-8EE7EB21DD1D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*", - "matchCriteriaId": "F5ECA190-D7D3-4248-A61E-0D87E67E3D31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*", - "matchCriteriaId": "8FD514B3-AFCD-4CB1-9D1B-18625B771E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*", - "matchCriteriaId": "CAC4250E-E638-4015-B5EF-7B5405F7FBFC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*", - "matchCriteriaId": "F1B7AA6F-9918-4356-894C-72833B791201" } ] } @@ -189,38 +74,71 @@ "references": [ { "url": "http://www.exploit-db.com/exploits/9160", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.g-sec.lu/one-bug-to-rule-them-all.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, { "url": "http://www.securityfocus.com/archive/1/504969/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/504988/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/504989/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/505006/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52874", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5957", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-100xx/CVE-2016-10003.json b/CVE-2016/CVE-2016-100xx/CVE-2016-10003.json index ef6c9bc4a22..2dac56c9714 100644 --- a/CVE-2016/CVE-2016-100xx/CVE-2016-10003.json +++ b/CVE-2016/CVE-2016-100xx/CVE-2016-10003.json @@ -2,7 +2,7 @@ "id": "CVE-2016-10003", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-27T17:59:00.180", - "lastModified": "2017-02-28T02:37:35.973", + "lastModified": "2024-02-02T03:03:55.400", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-697" } ] } @@ -84,223 +84,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E0868B12-EDF9-42D9-BB43-15F623A3310B" + "criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5.0.1", + "versionEndExcluding": "3.5.23", + "matchCriteriaId": "9AE6398D-3000-4C1B-8BB3-37AE280BEDD2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F710949D-F0FE-43F4-ADB3-6EB679A70280" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DCB75144-2437-40A8-8CA3-A487B603F7DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "6CED2CB3-BE78-4818-A6D7-847A1ACE74DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "705D8320-A278-483A-AE47-802044CE685E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "715634E1-F7BE-4106-BDA7-B7D147EEA800" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "21E9E155-FC6F-46E7-8BF7-65DF097409D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "CF72FA7A-E35D-4000-9DDA-71E55EA3A4D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "26A3F10F-938E-44D6-845D-B66EF9812C21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B1D82EEE-F65E-4657-B0F7-6CE33D219134" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C9E6A845-B67C-4112-8240-9F61D6AF3B0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "4BEDD7E3-E263-4A09-9C11-3E008E01BC28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.9:*:*:*:*:*:*:*", - "matchCriteriaId": "80E3FF16-A6CD-456C-B58A-381A75D8616C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.10:*:*:*:*:*:*:*", - "matchCriteriaId": "87D02AB2-AA26-4416-B689-02C5EEF2099C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.11:*:*:*:*:*:*:*", - "matchCriteriaId": "A134E1F1-AFCC-498B-8840-5884CF858769" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.12:*:*:*:*:*:*:*", - "matchCriteriaId": "D5F4E7D0-B6F4-476E-A011-55619E91A3B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.13:*:*:*:*:*:*:*", - "matchCriteriaId": "95588755-27E8-4DB7-B865-A784D3638FE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.14:*:*:*:*:*:*:*", - "matchCriteriaId": "2CD4DDBC-4243-459A-B43D-FF8F0AE0BA3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.15:*:*:*:*:*:*:*", - "matchCriteriaId": "0F90E11F-FC03-46D9-A9C4-A578196D59D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "EDC9BEE2-D7E4-4192-963C-E9F2364FC8CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CA0BDDAD-2912-480F-8911-8FF94E1A7415" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.18:*:*:*:*:*:*:*", - "matchCriteriaId": "275C4ED9-0C69-4CFD-9C1D-D734731DD940" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.19:*:*:*:*:*:*:*", - "matchCriteriaId": "647A80E8-9AA4-41B4-B2F2-9D07D839DFEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.20:*:*:*:*:*:*:*", - "matchCriteriaId": "CC3EDC70-9DE3-454E-A90D-7D4A4C082517" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.21:*:*:*:*:*:*:*", - "matchCriteriaId": "8E397BA5-4FA4-402F-BFCC-9077ED93C438" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:3.5.22:*:*:*:*:*:*:*", - "matchCriteriaId": "4649C5C3-7371-4B92-9E06-73AE4CF39685" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "060FCBEA-DEAA-42FB-88C9-4B78136B172F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "74987102-8CA8-4120-B686-F18579A96A46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DA7828AA-48B6-44CD-8507-345A4F0A25BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "6640F25F-CC8B-4B05-A97A-2186BD0B5ED8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A037F780-6FC9-4130-908F-B5434FA0C7DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDEB455-F082-44E4-8CEA-019C0084BF05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "49555803-288E-4B0A-B12A-890E5E0AD05F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "EBEE374C-365E-49DE-A9F9-6083044C774D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "1B6B2A8E-DD81-43CD-9F5B-E8F87498E513" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "179ACC3B-D8C8-4CE2-964F-CBF29BBB066A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252E5ABE-5113-4987-931E-16B69C4CE424" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "9285C454-7F60-4AEA-A134-124C1E0745FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2F753944-8EC0-4CE5-98E5-71798F9EC663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "F1BD3131-D4F3-4B29-9408-754B6190DAEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "3F00481A-5E3B-45A1-A2A5-56E63F91C834" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squid-cache:squid:4.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "217AB656-D70C-4009-8797-C58002FDB6C0" + "criteria": "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.1", + "versionEndExcluding": "4.0.17", + "matchCriteriaId": "32C73B3C-ECDF-450E-A039-9F09A18570E4" } ] } @@ -321,6 +115,7 @@ "url": "http://www.securityfocus.com/bid/94953", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -329,6 +124,7 @@ "url": "http://www.securitytracker.com/id/1037512", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -337,7 +133,6 @@ "url": "http://www.squid-cache.org/Advisories/SQUID-2016_10.txt", "source": "cve@mitre.org", "tags": [ - "Mitigation", "Patch", "Vendor Advisory" ] diff --git a/CVE-2019/CVE-2019-10100xx/CVE-2019-1010006.json b/CVE-2019/CVE-2019-10100xx/CVE-2019-1010006.json index b89fe680626..f153c73d0b2 100644 --- a/CVE-2019/CVE-2019-10100xx/CVE-2019-1010006.json +++ b/CVE-2019/CVE-2019-10100xx/CVE-2019-1010006.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1010006", "sourceIdentifier": "josh@bress.net", "published": "2019-07-15T02:15:10.370", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:07:20.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -94,6 +94,66 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493" + } + ] + } + ] } ], "references": [ @@ -108,7 +168,11 @@ }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00046.html", - "source": "josh@bress.net" + "source": "josh@bress.net", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.gnome.org/show_bug.cgi?id=788980", @@ -121,23 +185,41 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00013.html", - "source": "josh@bress.net" + "source": "josh@bress.net", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00014.html", - "source": "josh@bress.net" + "source": "josh@bress.net", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://seclists.org/bugtraq/2020/Feb/18", - "source": "josh@bress.net" + "source": "josh@bress.net", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4067-1/", - "source": "josh@bress.net" + "source": "josh@bress.net", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2020/dsa-4624", - "source": "josh@bress.net" + "source": "josh@bress.net", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-158xx/CVE-2020-15811.json b/CVE-2020/CVE-2020-158xx/CVE-2020-15811.json index 9bcefaaaf42..252316de6b8 100644 --- a/CVE-2020/CVE-2020-158xx/CVE-2020-15811.json +++ b/CVE-2020/CVE-2020-158xx/CVE-2020-15811.json @@ -2,8 +2,8 @@ "id": "CVE-2020-15811", "sourceIdentifier": "cve@mitre.org", "published": "2020-09-02T17:15:11.687", - "lastModified": "2023-11-07T03:17:55.657", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:04:21.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-444" + "value": "CWE-697" } ] } @@ -211,8 +211,7 @@ "url": "https://github.com/squid-cache/squid/security/advisories/GHSA-c7p8-xqhm-49wv", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -225,15 +224,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE6FKUN7IGTIR2MEEMWYDT7N5EJJLZI2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMTFLVB7GLRF2CKGFPZ4G4R5DIIPHWI3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJJDI7JQFGQLVNCKMVY64LAFMKERAOK7/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20210219-0007/", @@ -253,6 +264,7 @@ "url": "https://security.netapp.com/advisory/ntap-20210226-0007/", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -274,6 +286,7 @@ "url": "https://www.debian.org/security/2020/dsa-4751", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Third Party Advisory" ] } diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json index 2ef7d667c12..c00cebf5c7f 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30663", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.413", - "lastModified": "2021-09-16T20:25:10.350", + "lastModified": "2024-02-02T03:08:37.943", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple Safari Webkit Browser Engine Integer Overflow Vulnerability", + "cisaVulnerabilityName": "Apple Multiple Products Integer Overflow Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json b/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json index e6add119cfa..fa1bc7665d7 100644 --- a/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json +++ b/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30860", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:14.370", - "lastModified": "2023-11-07T03:33:34.353", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:08:54.213", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -199,63 +199,116 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2021/Sep/25", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/26", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/27", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/28", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/38", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/39", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/40", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2021/Sep/50", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2022/09/02/11", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.gentoo.org/glsa/202209-21", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212804", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212805", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212806", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT212807", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/kb/HT212824", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-435xx/CVE-2021-43537.json b/CVE-2021/CVE-2021-435xx/CVE-2021-43537.json index d4ff628a5fc..dd38859eedb 100644 --- a/CVE-2021/CVE-2021-435xx/CVE-2021-43537.json +++ b/CVE-2021/CVE-2021-435xx/CVE-2021-43537.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43537", "sourceIdentifier": "security@mozilla.org", "published": "2021-12-08T22:15:09.620", - "lastModified": "2022-12-09T15:19:17.787", + "lastModified": "2024-02-02T03:05:31.560", "vulnStatus": "Analyzed", "descriptions": [ { @@ -136,7 +136,6 @@ "source": "security@mozilla.org", "tags": [ "Issue Tracking", - "Permissions Required", "Vendor Advisory" ] }, @@ -174,6 +173,7 @@ "url": "https://www.debian.org/security/2021/dsa-5026", "source": "security@mozilla.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, @@ -181,6 +181,7 @@ "url": "https://www.debian.org/security/2022/dsa-5034", "source": "security@mozilla.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2022/CVE-2022-05xx/CVE-2022-0545.json b/CVE-2022/CVE-2022-05xx/CVE-2022-0545.json index d96ca2febe2..ae3426f27d9 100644 --- a/CVE-2022/CVE-2022-05xx/CVE-2022-0545.json +++ b/CVE-2022/CVE-2022-05xx/CVE-2022-0545.json @@ -2,8 +2,8 @@ "id": "CVE-2022-0545", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2022-02-24T19:15:09.760", - "lastModified": "2023-11-07T03:41:22.123", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:09:18.633", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -75,7 +75,7 @@ ] }, { - "source": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "source": "patrick@puiterwijk.org", "type": "Secondary", "description": [ { @@ -142,6 +142,7 @@ "url": "https://developer.blender.org/T94629", "source": "patrick@puiterwijk.org", "tags": [ + "Issue Tracking", "Patch", "Vendor Advisory" ] @@ -150,6 +151,7 @@ "url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00021.html", "source": "patrick@puiterwijk.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40744.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40744.json new file mode 100644 index 00000000000..02b331af632 --- /dev/null +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40744.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-40744", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T04:15:07.700", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236441." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/236441", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7111778", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json index e6772b06f29..4ca74e5170d 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32333", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:16.323", - "lastModified": "2024-02-02T02:15:16.323", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json new file mode 100644 index 00000000000..53dd711dfa5 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38019", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T04:15:07.937", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 260575." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260575", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7111679", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38020.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38020.json new file mode 100644 index 00000000000..d91f54ce006 --- /dev/null +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38020.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38020", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T04:15:08.147", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-117" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260576", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7111679", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38263.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38263.json new file mode 100644 index 00000000000..ce292ab5bef --- /dev/null +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38263.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38263", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T04:15:08.360", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 260577." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260577", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7111679", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json index 2a37b5cd4fb..cebbff5e36b 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40088.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40088", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.230", - "lastModified": "2023-12-22T01:15:10.340", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:15:16.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,12 +90,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/5bfd817719fcf55cbb3476e6b5539a3db4c437fc", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40089.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40089.json index 7ed1bdfffc9..7cdedd70b2b 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40089.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40089.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40089", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.283", - "lastModified": "2023-12-22T01:15:10.407", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:15:30.553", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,12 +70,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40090.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40090.json index b62d7d215cd..02ea3f4e38b 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40090.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40090.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40090", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.337", - "lastModified": "2023-12-22T01:15:10.473", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:15:34.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,12 +90,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Third Party Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40091.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40091.json index d39e39e7f4c..6f92709d078 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40091.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40091.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40091", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.387", - "lastModified": "2023-12-22T01:15:10.543", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:15:39.110", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,12 +90,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/0ec7b119d41adcbba23f9349e16de9e7e11683f6", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40092.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40092.json index 6a8f38e70c9..22df61a7d64 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40092.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40092", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.440", - "lastModified": "2023-12-22T01:15:10.613", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:15:44.960", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,12 +90,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/a5e55363e69b3c84d3f4011c7b428edb1a25752c", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40094.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40094.json index 85d67745512..d743e7ef50a 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40094.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40094.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40094", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.493", - "lastModified": "2023-12-22T01:15:10.677", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:10:05.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,7 +90,11 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40095.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40095.json index 90b6dff4cc9..54028d27446 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40095.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40095.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40095", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.547", - "lastModified": "2023-12-22T01:15:10.740", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:09:57.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,12 +90,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40096.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40096.json index 340289edaad..851ba4600ea 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40096.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40096", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.600", - "lastModified": "2023-12-22T01:15:10.803", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:14:44.280", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,24 +90,37 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/148aeea373febc959c429f2cabd8323508c38ad8", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/5f401fc9f214789d691798620fea60015962370a", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/b0f6558fb36eb76df35c516ec5a65030a34a8734", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/native/+/9ddecd3d2b88de5ff7aa890d7ba9967c30d8b183", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40097.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40097.json index c95245f7055..48b30cc16d1 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40097.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40097", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.657", - "lastModified": "2023-12-22T01:15:10.867", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:14:39.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,12 +85,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Launcher3/+/6c9a41117d5a9365cf34e770bbb00138f6bf997e", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40098.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40098.json index 46459a6a24a..f1bf002f39d 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40098.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40098", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.707", - "lastModified": "2023-12-22T01:15:10.953", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:14:34.950", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,12 +85,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40103.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40103.json index 2aecd4ad539..82abce4160b 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40103.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40103", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:24.757", - "lastModified": "2023-12-22T01:15:11.020", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:14:29.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,20 +70,33 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/58fa254a5d1aee2206de90d5396c01e177483e3a", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/c3bc12c484ef3bbca4cec19234437c45af5e584d", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40462.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40462.json index 5036f63b5b8..7e98d31699b 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40462.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40462.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40462", "sourceIdentifier": "security@sierrawireless.com", "published": "2023-12-04T23:15:25.603", - "lastModified": "2023-12-31T00:15:44.220", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:12:25.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -138,12 +138,31 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00024.html", - "source": "security@sierrawireless.com" + "source": "security@sierrawireless.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42882.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42882.json index a00847758c8..e404d79e9b4 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42882.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42882.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42882", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.280", - "lastModified": "2024-01-12T16:15:51.933", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:10:11.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-787" } ] } @@ -72,7 +72,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42883.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42883.json index 24bb806fbd9..c8d678a25ea 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42883.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42883.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42883", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.330", - "lastModified": "2023-12-19T21:15:08.097", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:10:50.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -111,6 +111,26 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] } ], "references": [ @@ -164,7 +184,11 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/18/1", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214034", @@ -216,7 +240,11 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5580", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json index 9a984901461..912d936e861 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42890", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.480", - "lastModified": "2024-01-31T15:15:10.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-02T03:11:18.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -142,11 +142,18 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/18/1", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-33", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214035", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42894.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42894.json index 1d0d9eed529..6676811dd47 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42894.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42894.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42894", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.587", - "lastModified": "2023-12-13T01:15:08.533", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:11:25.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -86,15 +86,27 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Dec/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/11", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214036", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42926.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42926.json index 141e3266a42..63a51d60367 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42926.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42926.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42926", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:12.683", - "lastModified": "2024-01-12T16:15:52.007", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:11:34.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,7 +72,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/9", diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45773.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45773.json index d6c66e7457f..9ca22a5efcb 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45773.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45773.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45773", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:26.440", - "lastModified": "2023-12-22T01:15:11.080", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:13:12.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -75,12 +75,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7b30443dac7bb9138275c909549110191bcbcae9", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45774.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45774.json index 9a257954e52..d0f2c976815 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45774.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45774.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45774", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:26.483", - "lastModified": "2023-12-22T01:15:11.150", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:13:23.130", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,12 +90,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45775.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45775.json index 63872713144..0a7755839a9 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45775.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45775.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45775", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:26.530", - "lastModified": "2023-12-22T01:15:11.220", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:13:30.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,12 +70,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45776.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45776.json index 72949127ad8..9a915dd5132 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45776.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45776.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45776", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:26.577", - "lastModified": "2023-12-22T01:15:11.297", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:14:10.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,12 +70,17 @@ "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45777.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45777.json index 9a755633802..310d0042e33 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45777.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45777.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45777", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:26.623", - "lastModified": "2023-12-22T01:15:11.367", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T03:14:19.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -75,16 +75,25 @@ "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/f4644b55d36a549710ba35b6fb797ba744807da6", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-12-01", "source": "security@android.com", "tags": [ + "Patch", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46159.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46159.json new file mode 100644 index 00000000000..43216c96584 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46159.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46159", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T03:15:09.920", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW. IBM X-Force ID: 268906." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268906", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7112263", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json index 2b0929e80b3..10981dc5c32 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46344", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.537", - "lastModified": "2024-02-02T02:15:16.537", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json index e535cfbc1af..9e7ba781025 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46838", "sourceIdentifier": "security@xen.org", "published": "2024-01-29T11:15:07.933", - "lastModified": "2024-02-02T02:06:40.353", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-02T03:15:10.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -70,6 +70,14 @@ } ], "references": [ + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/", + "source": "security@xen.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/", + "source": "security@xen.org" + }, { "url": "https://xenbits.xenproject.org/xsa/advisory-448.html", "source": "security@xen.org", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json index 5cb488ec637..9fdfe2c4be4 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48792", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.590", - "lastModified": "2024-02-02T02:15:16.590", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json index 0bd881b0989..7b81fb79958 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48793", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.637", - "lastModified": "2024-02-02T02:15:16.637", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json index 95b55c94fc1..4061c0a4037 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50328", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:16.683", - "lastModified": "2024-02-02T02:15:16.683", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json index d1cbd1d0936..e0d1a2473d1 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50934", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:16.890", - "lastModified": "2024-02-02T02:15:16.890", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json index 1f7fe160cc4..5073ff45e59 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50935", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:17.087", - "lastModified": "2024-02-02T02:15:17.087", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json index b2ce7ef0502..97a73fff376 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50938", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:17.277", - "lastModified": "2024-02-02T02:15:17.277", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json index a205e37c3a9..6b29476fe0d 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50941", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:17.467", - "lastModified": "2024-02-02T02:15:17.467", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json index f5e8f15ca25..96ead5c1224 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50962", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T02:15:17.667", - "lastModified": "2024-02-02T02:15:17.667", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json index 5da18217a26..2599555a6c3 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5156", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-25T16:15:15.613", - "lastModified": "2023-12-15T18:18:02.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-02T04:15:08.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -165,6 +165,10 @@ "Patch" ] }, + { + "url": "https://security.gentoo.org/glsa/202402-01", + "source": "secalert@redhat.com" + }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=30884", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json index b72daacb298..55878552dea 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6246.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6246", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.420", - "lastModified": "2024-02-01T06:15:53.180", + "lastModified": "2024-02-02T04:15:08.713", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria en la funci\u00f3n __vsyslog_internal de la librer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando no se llam\u00f3 a la funci\u00f3n openlog, o se llam\u00f3 con el argumento ident establecido en NULL, y el nombre del programa (el nombre base de argv[0]) tiene m\u00e1s de 1024 bytes, lo que provoca un bloqueo de la aplicaci\u00f3n o una escalada de privilegios locales. Este problema afecta a glibc 2.36 y versiones posteriores." } ], "metrics": { @@ -142,6 +146,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/", "source": "secalert@redhat.com" }, + { + "url": "https://security.gentoo.org/glsa/202402-01", + "source": "secalert@redhat.com" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/01/30/6", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json index 30e2964296e..385e84fb019 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6779.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6779", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.700", - "lastModified": "2024-02-01T06:15:53.350", + "lastModified": "2024-02-02T04:15:08.813", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria de off-by-one en la funci\u00f3n __vsyslog_internal de la librer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando estas funciones se llaman con un mensaje mayor que INT_MAX bytes, lo que genera un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer para almacenar el mensaje, lo que provoca un bloqueo de la aplicaci\u00f3n. Este problema afecta a glibc 2.37 y posteriores." } ], "metrics": { @@ -67,6 +71,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/", "source": "secalert@redhat.com" }, + { + "url": "https://security.gentoo.org/glsa/202402-01", + "source": "secalert@redhat.com" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/01/30/6", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json index 2ddcfb31f69..bdaba8cd45e 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6780", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.917", - "lastModified": "2024-02-01T06:15:53.443", + "lastModified": "2024-02-02T04:15:08.907", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 un desbordamiento de enteros en la funci\u00f3n __vsyslog_internal de la liibrer\u00eda glibc. Esta funci\u00f3n es llamada por las funciones syslog y vsyslog. Este problema ocurre cuando estas funciones se llaman con un mensaje muy largo, lo que genera un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer para almacenar el mensaje, lo que genera un comportamiento indefinido. Este problema afecta a glibc 2.37 y posteriores." } ], "metrics": { @@ -67,6 +71,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/", "source": "secalert@redhat.com" }, + { + "url": "https://security.gentoo.org/glsa/202402-01", + "source": "secalert@redhat.com" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/01/30/6", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1059.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1059.json index 300f1da706f..7f1e393f5c7 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1059.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1059", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-30T22:15:52.937", - "lastModified": "2024-01-31T14:05:27.507", + "lastModified": "2024-02-02T03:15:10.207", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,10 @@ { "url": "https://crbug.com/1514777", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1060.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1060.json index 0b73e330542..15f756d6a1e 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1060.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1060.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1060", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-30T22:15:53.000", - "lastModified": "2024-01-31T14:05:27.507", + "lastModified": "2024-02-02T03:15:10.313", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,10 @@ { "url": "https://crbug.com/1511567", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json index 0f509b2159f..7670daa7dc5 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1077.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1077", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-30T22:15:53.090", - "lastModified": "2024-01-31T14:05:27.507", + "lastModified": "2024-02-02T03:15:10.417", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -23,6 +23,10 @@ { "url": "https://crbug.com/1511085", "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/", + "source": "chrome-cve-admin@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json index 1a982f06f39..9c75a67f7dc 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20305.json @@ -2,12 +2,12 @@ "id": "CVE-2024-20305", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-01-26T18:15:11.350", - "lastModified": "2024-02-01T21:14:41.087", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-02T03:15:10.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." + "value": "A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." }, { "lang": "es", @@ -68,6 +68,16 @@ "value": "CWE-79" } ] + }, + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json new file mode 100644 index 00000000000..62f9ad26f89 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22319", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T03:15:10.573", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote attacker to conduct an LDAP injection. By sending a request with a specially crafted request, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter. IBM X-Force ID: 279145." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-90" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279145", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7112382", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22320.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22320.json new file mode 100644 index 00000000000..e28e4996036 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22320.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22320", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T03:15:10.780", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279146", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7112382", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json index 9cc79695cb7..333da79f1e4 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22420.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22420", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-19T21:15:09.667", - "lastModified": "2024-01-26T20:12:04.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-02T03:15:10.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json index 5a4eabfc5e8..f9fe104d465 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22421", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-19T21:15:09.870", - "lastModified": "2024-01-26T20:15:23.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-02T03:15:11.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -120,6 +120,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQJKNRDRFMKGVRIYNNN6CKMNJDNYWO2H/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22533.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22533.json new file mode 100644 index 00000000000..bd206004939 --- /dev/null +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22533.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-22533", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T03:15:11.210", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Before Beetl v3.15.12, the rendering template has a server-side template injection (SSTI) vulnerability. When the incoming template is controllable, it will be filtered by the DefaultNativeSecurityManager blacklist. Because blacklist filtering is not strict, the blacklist can be bypassed, leading to arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/xiandafu/beetl/issues/I8RU01", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json index 8ad457bb52b..65b77216ba8 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22779", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:17.890", - "lastModified": "2024-02-02T02:15:17.890", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json index 054afb8d0c8..190e652fe26 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22899", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:18.073", - "lastModified": "2024-02-02T02:15:18.073", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json index 6384470b4c6..195b6277ba6 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22900", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:18.127", - "lastModified": "2024-02-02T02:15:18.127", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json index 77c8c293eb6..3627ca174af 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22901", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:18.177", - "lastModified": "2024-02-02T02:15:18.177", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json index 03ff1af4681..c34863ca78b 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22902", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:18.223", - "lastModified": "2024-02-02T02:15:18.223", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json index 256b286bf01..a88bb4599de 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22903", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:18.277", - "lastModified": "2024-02-02T02:15:18.277", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json index 6558d9ec849..840fba0e3f1 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23746", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:18.330", - "lastModified": "2024-02-02T02:15:18.330", - "vulnStatus": "Received", + "lastModified": "2024-02-02T04:58:55.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 169846c2d2b..419e7799e75 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-02T03:00:57.302409+00:00 +2024-02-02T05:00:24.708571+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-02T02:59:48.153000+00:00 +2024-02-02T04:58:55.817000+00:00 ``` ### Last Data Feed Release @@ -29,68 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -237371 +237379 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `8` -* [CVE-2023-50326](CVE-2023/CVE-2023-503xx/CVE-2023-50326.json) (`2024-02-02T01:15:07.710`) -* [CVE-2023-50327](CVE-2023/CVE-2023-503xx/CVE-2023-50327.json) (`2024-02-02T01:15:07.937`) -* [CVE-2023-50933](CVE-2023/CVE-2023-509xx/CVE-2023-50933.json) (`2024-02-02T01:15:08.140`) -* [CVE-2023-50936](CVE-2023/CVE-2023-509xx/CVE-2023-50936.json) (`2024-02-02T01:15:08.310`) -* [CVE-2023-50937](CVE-2023/CVE-2023-509xx/CVE-2023-50937.json) (`2024-02-02T01:15:08.520`) -* [CVE-2023-50940](CVE-2023/CVE-2023-509xx/CVE-2023-50940.json) (`2024-02-02T01:15:08.753`) -* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T02:15:16.323`) -* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T02:15:16.537`) -* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T02:15:16.590`) -* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T02:15:16.637`) -* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T02:15:16.683`) -* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T02:15:16.890`) -* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T02:15:17.087`) -* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T02:15:17.277`) -* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T02:15:17.467`) -* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T02:15:17.667`) -* [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-02-02T01:15:08.970`) -* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T02:15:17.890`) -* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T02:15:18.073`) -* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T02:15:18.127`) -* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T02:15:18.177`) -* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T02:15:18.223`) -* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T02:15:18.277`) -* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T02:15:18.330`) +* [CVE-2022-40744](CVE-2022/CVE-2022-407xx/CVE-2022-40744.json) (`2024-02-02T04:15:07.700`) +* [CVE-2023-46159](CVE-2023/CVE-2023-461xx/CVE-2023-46159.json) (`2024-02-02T03:15:09.920`) +* [CVE-2023-38019](CVE-2023/CVE-2023-380xx/CVE-2023-38019.json) (`2024-02-02T04:15:07.937`) +* [CVE-2023-38020](CVE-2023/CVE-2023-380xx/CVE-2023-38020.json) (`2024-02-02T04:15:08.147`) +* [CVE-2023-38263](CVE-2023/CVE-2023-382xx/CVE-2023-38263.json) (`2024-02-02T04:15:08.360`) +* [CVE-2024-22319](CVE-2024/CVE-2024-223xx/CVE-2024-22319.json) (`2024-02-02T03:15:10.573`) +* [CVE-2024-22320](CVE-2024/CVE-2024-223xx/CVE-2024-22320.json) (`2024-02-02T03:15:10.780`) +* [CVE-2024-22533](CVE-2024/CVE-2024-225xx/CVE-2024-22533.json) (`2024-02-02T03:15:11.210`) ### CVEs modified in the last Commit -Recently modified CVEs: `94` +Recently modified CVEs: `70` -* [CVE-2024-23033](CVE-2024/CVE-2024-230xx/CVE-2024-23033.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-23034](CVE-2024/CVE-2024-230xx/CVE-2024-23034.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-24756](CVE-2024/CVE-2024-247xx/CVE-2024-24756.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-21764](CVE-2024/CVE-2024-217xx/CVE-2024-21764.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-21794](CVE-2024/CVE-2024-217xx/CVE-2024-21794.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-21866](CVE-2024/CVE-2024-218xx/CVE-2024-21866.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-21869](CVE-2024/CVE-2024-218xx/CVE-2024-21869.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-22016](CVE-2024/CVE-2024-220xx/CVE-2024-22016.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-22096](CVE-2024/CVE-2024-220xx/CVE-2024-22096.json) (`2024-02-02T01:57:57.640`) -* [CVE-2024-21852](CVE-2024/CVE-2024-218xx/CVE-2024-21852.json) (`2024-02-02T01:58:03.307`) -* [CVE-2024-23747](CVE-2024/CVE-2024-237xx/CVE-2024-23747.json) (`2024-02-02T02:03:39.093`) -* [CVE-2024-22559](CVE-2024/CVE-2024-225xx/CVE-2024-22559.json) (`2024-02-02T02:03:48.573`) -* [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-02-02T02:04:13.267`) -* [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-02-02T02:05:39.277`) -* [CVE-2024-23791](CVE-2024/CVE-2024-237xx/CVE-2024-23791.json) (`2024-02-02T02:07:28.850`) -* [CVE-2024-23792](CVE-2024/CVE-2024-237xx/CVE-2024-23792.json) (`2024-02-02T02:07:40.577`) -* [CVE-2024-23790](CVE-2024/CVE-2024-237xx/CVE-2024-23790.json) (`2024-02-02T02:07:58.653`) -* [CVE-2024-0212](CVE-2024/CVE-2024-02xx/CVE-2024-0212.json) (`2024-02-02T02:08:12.603`) -* [CVE-2024-24736](CVE-2024/CVE-2024-247xx/CVE-2024-24736.json) (`2024-02-02T02:08:23.417`) -* [CVE-2024-0959](CVE-2024/CVE-2024-09xx/CVE-2024-0959.json) (`2024-02-02T02:18:46.160`) -* [CVE-2024-0960](CVE-2024/CVE-2024-09xx/CVE-2024-0960.json) (`2024-02-02T02:19:05.557`) -* [CVE-2024-0962](CVE-2024/CVE-2024-09xx/CVE-2024-0962.json) (`2024-02-02T02:19:44.257`) -* [CVE-2024-0958](CVE-2024/CVE-2024-09xx/CVE-2024-0958.json) (`2024-02-02T02:20:21.333`) -* [CVE-2024-0470](CVE-2024/CVE-2024-04xx/CVE-2024-0470.json) (`2024-02-02T02:47:35.793`) -* [CVE-2024-0471](CVE-2024/CVE-2024-04xx/CVE-2024-0471.json) (`2024-02-02T02:48:16.190`) +* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-02T04:15:08.813`) +* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-02-02T04:15:08.907`) +* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T04:58:55.817`) +* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-1059](CVE-2024/CVE-2024-10xx/CVE-2024-1059.json) (`2024-02-02T03:15:10.207`) +* [CVE-2024-1060](CVE-2024/CVE-2024-10xx/CVE-2024-1060.json) (`2024-02-02T03:15:10.313`) +* [CVE-2024-1077](CVE-2024/CVE-2024-10xx/CVE-2024-1077.json) (`2024-02-02T03:15:10.417`) +* [CVE-2024-20305](CVE-2024/CVE-2024-203xx/CVE-2024-20305.json) (`2024-02-02T03:15:10.463`) +* [CVE-2024-22420](CVE-2024/CVE-2024-224xx/CVE-2024-22420.json) (`2024-02-02T03:15:10.977`) +* [CVE-2024-22421](CVE-2024/CVE-2024-224xx/CVE-2024-22421.json) (`2024-02-02T03:15:11.097`) +* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T04:58:55.817`) +* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T04:58:55.817`) ## Download and Usage