Auto-Update: 2023-08-02T20:00:31.057053+00:00

This commit is contained in:
cad-safe-bot 2023-08-02 20:00:34 +00:00
parent 53f5c4b775
commit aea6bbc39c
41 changed files with 2310 additions and 927 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-0089",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2017-10-11T01:29:50.543",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:04:41.800",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -58,38 +58,14 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F19339B-AAA0-4042-895C-4A21C051285C"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.5",
"matchCriteriaId": "947C0E11-0B3B-439D-AE55-C8AF48A2013E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4"
"criteria": "cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE315FF0-8715-4FF6-ADBD-AD99AB0D0882"
}
]
}
@ -99,56 +75,89 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=110746469728728&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://python.org/security/PSF-2005-001/patch-2.2.txt",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://securitytracker.com/id?1013083",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-666",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:035",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.python.org/security/PSF-2005-001/",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-108.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/12437",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.trustix.org/errata/2005/0003/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19217",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9811",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2006-4980",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-10-10T04:06:00.000",
"lastModified": "2018-10-17T21:40:40.327",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:04:54.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -69,88 +69,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.6",
"matchCriteriaId": "9166CB74-7623-44E6-9E68-A00768A8A870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "130E7AE9-EC3B-4E46-89BE-35ABC1CFACAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4284452B-A664-4974-A64D-3BD6E7BDE886"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA70292-BAD3-4C41-BCAB-D7F49EE00066"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_alpha_1:*:*:*:*:*:*:*",
"matchCriteriaId": "474CC2B2-ED66-43A7-A96C-F1C70872C230"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_alpha_2:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE97837-C2E7-4C5E-81B3-8BE38FC8DD32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_beta_1:*:*:*:*:*:*:*",
"matchCriteriaId": "B4534811-A18D-46AB-8ABB-9760F43D1D41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_beta_2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CBF058C-11E9-4B74-93D1-9FFD3F49FAB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_beta_3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AD42C6-6D13-4043-BB96-DE4E4BFCE5D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_final:*:*:*:*:*:*:*",
"matchCriteriaId": "7C93C70B-D3F7-426E-B2CC-54A0DAF9F4CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_release_candidate_1:*:*:*:*:*:*:*",
"matchCriteriaId": "489B6753-7F90-497E-B24C-D6C3763F59F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5_release_candidate_2:*:*:*:*:*:*:*",
"matchCriteriaId": "296B7B95-C7A0-4863-A468-BF2448D74156"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.4.0",
"versionEndExcluding": "2.4.4",
"matchCriteriaId": "6254AFCD-2750-4FD2-8139-8A4BC07B0D06"
}
]
}
@ -160,111 +88,199 @@
"references": [
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200610-07.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1017019",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-1197",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-1198",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:181",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_25_sr.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2006-0713.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/448244/100/100/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/20376",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-359-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3940",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/5131",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29408",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-702",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-2052",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-04-16T22:19:00.000",
"lastModified": "2018-10-16T16:41:42.710",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:04:59.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -55,7 +55,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-193"
}
]
}
@ -69,13 +69,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4"
"criteria": "cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE315FF0-8715-4FF6-ADBD-AD99AB0D0882"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC837C-CA10-4F04-A537-A6C759C7BE69"
"criteria": "cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "690CBE11-2D97-4D59-A21C-2AC388E67273"
}
]
}
@ -85,103 +85,188 @@
"references": [
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1551",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1620",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.python.org/download/releases/2.5.1/NEWS.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/469294/30/6450/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/23887",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.trustix.org/errata/2007/0019/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-585-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/1465",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0637",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3316",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-1358",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-4165",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-08-07T10:17:00.000",
"lastModified": "2017-07-29T01:32:45.457",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:59:17.273",
"vulnStatus": "Analyzed",
"evaluatorComment": "http://xuyiyang.com/wordpress-themes/blue-memories - This website is the homepage of Blue Memories 1.5 theme for Wordpress. The theme was developed by Xu Yiyang.",
"descriptions": [
{
@ -49,7 +49,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-79"
}
]
}
@ -63,13 +63,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xu_yiyang:blue_memories_theme:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D1AE75A8-05AF-4043-94A9-88464E3C22F0"
"criteria": "cpe:2.3:a:xuyiyang:blue_memories_theme:1.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B23D7726-7449-4085-BF29-ADF3EBD59203"
}
]
}
@ -79,15 +74,26 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/25215",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://xuyiyang.com/2007/06/22/blue-memories-and-spring-updated/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35817",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-4965",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-18T22:17:00.000",
"lastModified": "2018-10-15T21:39:00.410",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:52:26.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -55,7 +55,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -69,138 +69,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "142541D5-63E0-4D2A-AD37-AC13CCA9B9DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEF6FB8-82E9-402B-B8BF-F95A4DD799AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "500B365C-D6BF-46F8-9200-6ED48A44355C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A08655B-5227-43A0-B645-07B615CC46FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13D0B367-52C0-4240-8126-1248314F1990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F19339B-AAA0-4042-895C-4A21C051285C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "08050FA1-95FB-4308-A6C2-622591C79BEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "422F7E41-F437-4441-8692-B45C41204CCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "130E7AE9-EC3B-4E46-89BE-35ABC1CFACAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9812A290-060A-4632-8A5D-475EDAD754D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBCBBC84-0F63-4BBC-9612-4D2FD74F6D91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4284452B-A664-4974-A64D-3BD6E7BDE886"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA70292-BAD3-4C41-BCAB-D7F49EE00066"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1582AC09-AD12-4411-B875-F2AB8DAA32B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC837C-CA10-4F04-A537-A6C759C7BE69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF212333-E797-4BB3-8BF7-4D51B52314D5"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.1",
"matchCriteriaId": "E17596CE-794B-43AF-BD92-CB3C490B3CB4"
}
]
}
@ -210,19 +81,31 @@
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=192876",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://docs.info.apple.com/article.html?artnum=307179",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html",
@ -233,125 +116,212 @@
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT3438",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.avaya.com/css/P8/documents/100074697",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1551",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1620",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/25696",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-585-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/3201",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/4238",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0637",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3316",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-1885",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0198",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-01-10T00:46:00.000",
"lastModified": "2018-10-15T21:58:33.123",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T19:11:11.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,8 +62,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
"criteria": "cpe:2.3:a:wp-contactform_project:wp-contactform:1.5:alpha:*:*:*:wordpress:*:*",
"matchCriteriaId": "C059DC29-0801-4CA4-A9E9-CC3A5C73D40A"
}
]
}
@ -75,32 +75,57 @@
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/3539",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://securityvulns.ru/Sdocument546.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://securityvulns.ru/Sdocument667.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://websecurity.com.ua/1600/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://websecurity.com.ua/1641/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/485786/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0491",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-01-30T22:00:00.000",
"lastModified": "2017-09-29T01:30:18.533",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:59:11.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,13 +62,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:fgallery_plugin:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E418EB0D-142E-4B62-9063-8BD58F5E7660"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
"criteria": "cpe:2.3:a:fgallery_project:fgallery:2.4.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A6CF4418-D3B2-474E-87CB-AACD26CF8D46"
}
]
}
@ -80,20 +75,32 @@
"url": "http://www.securityfocus.com/bid/27464",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0349",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39964",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/4993",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0615",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-06T12:00:00.000",
"lastModified": "2018-10-15T22:02:12.820",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T19:05:18.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,18 +62,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dmsguestbook:dmsguestbook:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5CCC6E14-B072-4C5C-8840-1C159347A4F1"
"criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dmsguestbook:dmsguestbook:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5039D99E-D075-4687-B913-D33FD16C8E9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
"criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.8.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E2DD6F12-A5D0-4F56-9156-5643AE71851A"
}
]
}
@ -83,22 +78,35 @@
"references": [
{
"url": "http://securityreason.com/securityalert/3615",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/27575",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/5035",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0616",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-06T12:00:00.000",
"lastModified": "2018-10-15T22:02:13.273",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:59:02.783",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,13 +62,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dmsguestbook:dmsguestbook:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5CCC6E14-B072-4C5C-8840-1C159347A4F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
"criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3"
}
]
}
@ -78,19 +73,33 @@
"references": [
{
"url": "http://securityreason.com/securityalert/3615",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40196",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/5035",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0617",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-06T12:00:00.000",
"lastModified": "2018-10-15T22:02:13.697",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:59:07.117",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,13 +62,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:daniel_m._schurter:dmsguestbook:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C0850C-2EF9-44F0-A229-3F41BDB8A269"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
"criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3"
}
]
}
@ -78,22 +73,35 @@
"references": [
{
"url": "http://securityreason.com/securityalert/3615",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/27575",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/5035",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-0618",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-06T12:00:00.000",
"lastModified": "2008-09-05T21:35:33.430",
"lastModified": "2023-08-02T18:59:22.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -62,23 +62,27 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:daniel_m._schurter:dmsguestbook:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C0850C-2EF9-44F0-A229-3F41BDB8A269"
"criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:daniel_m._schurter:dmsguestbook:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80D8D494-6580-4FC0-AED8-96D5AB5AAF8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
"criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.8.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E2DD6F12-A5D0-4F56-9156-5643AE71851A"
}
]
}
]
}
],
"references": []
"references": [
{
"url": "http://secunia.com/advisories/28759",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-1679",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-04-22T04:41:00.000",
"lastModified": "2017-09-29T01:30:49.317",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:52:56.997",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -55,7 +55,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -69,14 +69,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.2",
"matchCriteriaId": "107216B7-C3A3-4A47-8E0B-2377C4A24357"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.3",
"matchCriteriaId": "34F10529-2CBD-4C4E-93EB-CCFFAA669647"
}
]
}
@ -86,82 +81,141 @@
"references": [
{
"url": "http://bugs.python.org/issue1179",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "http://bugs.python.org/msg64682",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200807-01.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT3438",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.avaya.com/css/P8/documents/100074697",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1551",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1620",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:164",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-632-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41958",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-2424",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10583",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7800",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-2316",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-01T14:41:00.000",
"lastModified": "2018-10-11T20:40:12.330",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:52:37.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -69,48 +69,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72BBBBEB-FD14-4452-84F7-1954312A4995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "00DEEEDB-98B2-43FE-A1B2-340294097399"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF212333-E797-4BB3-8BF7-4D51B52314D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C38CD209-A46D-4DDB-BA05-3B0E894371C8"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.2",
"matchCriteriaId": "9E0806D1-04EA-492A-8587-1886F47ECC80"
}
]
}
@ -127,63 +88,111 @@
},
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=230640",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200807-16.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT3438",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0243",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/495445/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/30491",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-632-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2288",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44173",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44174",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-3143",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-01T14:41:00.000",
"lastModified": "2018-10-11T20:47:15.690",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:50:51.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,11 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-190"
}
]
}
@ -66,44 +62,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.1",
"matchCriteriaId": "3C2E61BC-2CAE-4B54-A86E-AF4A72A7A9D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72BBBBEB-FD14-4452-84F7-1954312A4995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "00DEEEDB-98B2-43FE-A1B2-340294097399"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.12",
"matchCriteriaId": "CB298734-933B-4BBD-9E94-2B6BA78833F5"
}
]
}
@ -113,83 +74,150 @@
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=232137",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200807-16.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://svn.python.org/view?rev=60793&view=rev",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0243",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1667",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:164",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.python.org/download/releases/2.5.2/NEWS.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.python.org/download/releases/2.6/NEWS.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/495445/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/30491",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-632-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2288",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3316",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7720",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8996",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-3144",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-01T14:41:00.000",
"lastModified": "2018-10-11T20:47:18.770",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:52:53.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -62,153 +62,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "142541D5-63E0-4D2A-AD37-AC13CCA9B9DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEF6FB8-82E9-402B-B8BF-F95A4DD799AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "500B365C-D6BF-46F8-9200-6ED48A44355C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A08655B-5227-43A0-B645-07B615CC46FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13D0B367-52C0-4240-8126-1248314F1990"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F19339B-AAA0-4042-895C-4A21C051285C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "08050FA1-95FB-4308-A6C2-622591C79BEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "422F7E41-F437-4441-8692-B45C41204CCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "130E7AE9-EC3B-4E46-89BE-35ABC1CFACAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9812A290-060A-4632-8A5D-475EDAD754D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72BBBBEB-FD14-4452-84F7-1954312A4995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBCBBC84-0F63-4BBC-9612-4D2FD74F6D91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4284452B-A664-4974-A64D-3BD6E7BDE886"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ABA70292-BAD3-4C41-BCAB-D7F49EE00066"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1582AC09-AD12-4411-B875-F2AB8DAA32B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "00DEEEDB-98B2-43FE-A1B2-340294097399"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "09FC837C-CA10-4F04-A537-A6C759C7BE69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BF212333-E797-4BB3-8BF7-4D51B52314D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python_software_foundation:python:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C38CD209-A46D-4DDB-BA05-3B0E894371C8"
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.2",
"matchCriteriaId": "9E0806D1-04EA-492A-8587-1886F47ECC80"
}
]
}
@ -218,7 +74,10 @@
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=232137",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://bugs.python.org/issue2588",
@ -229,103 +88,189 @@
},
{
"url": "http://bugs.python.org/issue2589",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200807-16.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT3438",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://svn.python.org/view?rev=63728&view=rev",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "http://svn.python.org/view?rev=63734&view=rev",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "http://svn.python.org/view?rev=63883&view=rev",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0243",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1667",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:164",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/495445/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/30491",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-632-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2288",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3316",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44171",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44173",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10170",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7725",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-4872",
"sourceIdentifier": "cret@cert.org",
"published": "2014-10-10T10:55:07.523",
"lastModified": "2016-06-29T14:33:12.517",
"lastModified": "2023-08-02T19:00:25.903",
"vulnStatus": "Analyzed",
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/306.html\">CWE-306: Missing Authentication for Critical Function</a>",
"descriptions": [
@ -49,7 +49,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}
@ -63,8 +63,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bmc:bmc_track-it\\!:11.3.0.355:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEF873F-118E-4049-BBC3-ADC4F2D58DED"
"criteria": "cpe:2.3:a:bmc:track-it\\!:11.3.0.355:*:*:*:*:*:*:*",
"matchCriteriaId": "5E1E260D-357B-4F49-B910-33178F0F29E4"
}
]
}
@ -74,7 +74,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/121036",
@ -86,7 +90,11 @@
},
{
"url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-8270",
"sourceIdentifier": "cret@cert.org",
"published": "2014-12-12T11:59:05.657",
"lastModified": "2014-12-12T20:38:29.197",
"lastModified": "2023-08-02T19:00:29.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -62,8 +62,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bmc:bmc_track-it\\!:11.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2AD228-34B3-435C-B456-5D56F0E6603C"
"criteria": "cpe:2.3:a:bmc:track-it\\!:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "15256367-4248-4A39-B8BC-D10C4E6B8549"
}
]
}
@ -73,11 +73,19 @@
"references": [
{
"url": "http://support.numarasoftware.com/support/articles.asp?how=%20AND%20&mode=detail&kcriteria=7508&ID=7654",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-14-419/",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39820",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-06-15T17:15:08.403",
"lastModified": "2023-08-01T09:15:09.630",
"vulnStatus": "Modified",
"lastModified": "2023-08-02T18:32:39.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-24767",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-04-12T18:15:09.510",
"lastModified": "2022-04-21T14:05:38.687",
"lastModified": "2023-08-02T19:28:28.173",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -127,6 +127,22 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.35.2",
"matchCriteriaId": "2C4FF412-E806-4D42-AA6A-FE021BCD9829"
}
]
}
]
}
],
"references": [

View File

@ -2,23 +2,85 @@
"id": "CVE-2022-4909",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-07-29T00:15:10.970",
"lastModified": "2023-07-31T12:54:58.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:25:50.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in XML in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially perform an ASLR bypass via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "107.0.5304.62",
"matchCriteriaId": "6E3E8C15-896B-4126-A53A-771C50A24E4F"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://crbug.com/1356211",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1522",
"sourceIdentifier": "security@genetec.com",
"published": "2023-04-05T19:15:07.737",
"lastModified": "2023-04-17T16:58:08.303",
"lastModified": "2023-08-02T19:32:36.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,13 +65,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:genetech:security_center:-:*:*:*:saas:*:*:*",
"matchCriteriaId": "3F917F63-BFDA-4F61-B8B9-EB98E93CFDAA"
"criteria": "cpe:2.3:a:genetec:security_center:-:*:*:*:saas:*:*:*",
"matchCriteriaId": "BC6A00E1-99F4-45AD-BCF9-2FF49A6914BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:genetech:security_center:5.11.2:*:*:*:-:*:*:*",
"matchCriteriaId": "76B67AA7-C1AF-4CD6-8761-0FDD43CC40C0"
"criteria": "cpe:2.3:a:genetec:security_center:5.11.2:*:*:*:-:*:*:*",
"matchCriteriaId": "4E268371-964A-4886-A5E9-9678F487C950"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21405",
"sourceIdentifier": "product-security@axis.com",
"published": "2023-07-25T08:15:09.927",
"lastModified": "2023-07-25T13:00:59.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:43:09.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -34,10 +54,231 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.65.4",
"matchCriteriaId": "250BA4C3-1498-4C31-9199-ED26336E4467"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17AB03CB-201D-4838-AA48-EE2BEABB1DDE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1210_\\(-b\\)_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndIncluding": "11.6.16.0",
"matchCriteriaId": "1025D3EF-359A-42F8-A6F3-A1A913BC84FF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:axis:a1210_\\(-b\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1CDF5C3-76A2-4D39-91C7-0F6D76EA2D0C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1601_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.84.4",
"matchCriteriaId": "0CF7DD49-AC16-4AF1-BCFF-7E9B385C17D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1601_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndIncluding": "10.12.171.0",
"matchCriteriaId": "6ADF9CDC-B131-4568-9E40-51534D18B033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1601_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndIncluding": "11.6.16.0",
"matchCriteriaId": "4AF50B3C-1DBC-4B90-8437-8FFB40878611"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:axis:a1601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D256893-7BD3-40A6-9877-2DED01770AC5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1610_\\(-b\\)_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.12.171.0",
"matchCriteriaId": "650F99B2-0A4E-4642-BFEE-83E137EE1940"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:a1610_\\(-b\\)_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndIncluding": "11.6.16.0",
"matchCriteriaId": "B19B16FF-93F4-46BF-B629-3FDE840EAE2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:axis:a1610_\\(-b\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "02A7D1B6-D87A-47DF-8CB4-76AD56B450EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.12.178",
"matchCriteriaId": "ED306393-885B-4898-95C7-CE5F61B96ED2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndIncluding": "11.5.53",
"matchCriteriaId": "352DA079-F861-49FF-AA51-F98F1188DFFE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:axis:a8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "498E4857-D25F-4827-8328-023B02A64006"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.12.178",
"matchCriteriaId": "ED306393-885B-4898-95C7-CE5F61B96ED2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndIncluding": "11.5.53",
"matchCriteriaId": "352DA079-F861-49FF-AA51-F98F1188DFFE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:axis:a8207_mkii:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AEF2999-77C1-4B5D-A633-FCE9E49F8376"
}
]
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/7f/3a/ed/cve-2023-21405-en-US-407244.pdf",
"source": "product-security@axis.com"
"source": "product-security@axis.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22743",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-02-14T21:15:12.547",
"lastModified": "2023-02-23T21:46:18.030",
"lastModified": "2023-08-02T19:27:45.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -86,24 +86,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.35.2",
"matchCriteriaId": "2C4FF412-E806-4D42-AA6A-FE021BCD9829"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.39.2",
"matchCriteriaId": "5EEE9C90-8812-4263-A041-F0207B29AF3C"
"matchCriteriaId": "613F976A-860B-4267-8364-74D7BC74030D"
}
]
}
@ -143,14 +127,18 @@
"url": "https://learn.microsoft.com/en-us/windows/win32/controls/cookbook-overview?redirectedfrom=MSDN#using-comctl32dll-version-6-in-an-application-that-uses-only-standard-extensions",
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
"Patch",
"Technical Description",
"Vendor Advisory"
]
},
{
"url": "https://learn.microsoft.com/en-us/windows/win32/sbscs/about-side-by-side-assemblies-",
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
"Patch",
"Technical Description",
"Vendor Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28130",
"sourceIdentifier": "cve@checkpoint.com",
"published": "2023-07-26T11:15:09.550",
"lastModified": "2023-08-02T12:15:10.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:15:09.977",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html",
"source": "cve@checkpoint.com"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Aug/4",
"source": "cve@checkpoint.com"

View File

@ -2,27 +2,90 @@
"id": "CVE-2023-32231",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-25T01:15:09.107",
"lastModified": "2023-07-25T13:01:04.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:17:06.810",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.818. During installation, binaries gets executed out of a subfolder in C:\\Windows\\Temp. A standard user can create the folder and path file ahead of time and obtain elevated code execution."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vasion:printerlogic_client:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "25.0.0.818",
"matchCriteriaId": "1744F408-10F1-47F7-9CF1-624B7D74B0B5"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Client_Release_Notes.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Security_Bulletin_CVE.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.vasion.com/press-releases/printerlogic-rebrands",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}
]
}

View File

@ -2,27 +2,90 @@
"id": "CVE-2023-32232",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-25T01:15:09.177",
"lastModified": "2023-07-25T13:01:04.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:12:35.040",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.836. During client installation and repair, a PrinterLogic binary is called by the installer to configure the device. This window is not hidden, and is running with elevated privileges. A standard user can break out of this window, obtaining a full SYSTEM command prompt window. This results in complete compromise via arbitrary SYSTEM code execution (elevation of privileges)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vasion:printerlogic_client:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "25.0.0.836",
"matchCriteriaId": "BEC08A07-C876-48D8-865E-26D136EDC2B2"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Client_Release_Notes.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Security_Bulletin_CVE.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.vasion.com/press-releases/printerlogic-rebrands",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3384",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:12.523",
"lastModified": "2023-07-25T13:01:09.337",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:17:31.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -34,14 +54,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3384",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216924",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-34189",
"sourceIdentifier": "security@apache.org",
"published": "2023-07-25T08:15:10.077",
"lastModified": "2023-07-25T13:00:59.687",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:51:03.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could use general users to delete and update the process, which only the admin can operate occurrences.\u00a0\n\nUsers are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8109 \u00a0to solve it.\n\n"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -23,14 +46,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.4.0",
"versionEndIncluding": "1.7.0",
"matchCriteriaId": "A758C808-F9C0-43D5-8061-DA3A69751D21"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/2",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/smxqyx43hxjvzv4w71n2n3rfho9p378s",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34235",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T18:15:10.800",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:02:29.150",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.10.8",
"matchCriteriaId": "BA7C9D2E-E4B5-4BA7-9174-51A805D34E39"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/strapi/strapi/releases/tag/v4.10.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35929",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T18:15:10.897",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:54:38.123",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "14.9-5",
"matchCriteriaId": "22469E90-AD27-4AE7-B3EE-AA093211124D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*",
"versionEndExcluding": "14.10.99.4",
"matchCriteriaId": "988A3CB6-2246-4A0C-90E9-7D0D647B3EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "14.10",
"versionEndExcluding": "14.10-2",
"matchCriteriaId": "1D6E5BBF-1DA0-4F5E-BC10-2E8201BF244C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0b2945fbd260d37aa0aff2ca1c867d160f76188d",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=32629",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35941",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T18:15:10.993",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:34:33.230",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +66,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.23.0",
"versionEndExcluding": "1.23.12",
"matchCriteriaId": "588736F6-2FDC-4CF7-AFFA-7CFE16ED6EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.24.0",
"versionEndExcluding": "1.24.10",
"matchCriteriaId": "D8412E60-1C2F-4764-94F5-563FAA297466"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.25.0",
"versionEndExcluding": "1.25.9",
"matchCriteriaId": "0EC8FEB8-BB13-443C-8905-30B03F8F52E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.26.0",
"versionEndExcluding": "1.26.4",
"matchCriteriaId": "DA35F763-2810-4231-B5A9-93310BF7B765"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35942",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T19:15:11.050",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:36:02.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +66,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.23.0",
"versionEndExcluding": "1.23.12",
"matchCriteriaId": "588736F6-2FDC-4CF7-AFFA-7CFE16ED6EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.24.0",
"versionEndExcluding": "1.24.10",
"matchCriteriaId": "D8412E60-1C2F-4764-94F5-563FAA297466"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.25.0",
"versionEndExcluding": "1.25.9",
"matchCriteriaId": "0EC8FEB8-BB13-443C-8905-30B03F8F52E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.26.0",
"versionEndExcluding": "1.26.4",
"matchCriteriaId": "DA35F763-2810-4231-B5A9-93310BF7B765"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35943",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T19:15:11.153",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T18:47:03.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +66,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.23.0",
"versionEndExcluding": "1.23.12",
"matchCriteriaId": "588736F6-2FDC-4CF7-AFFA-7CFE16ED6EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.24.0",
"versionEndExcluding": "1.24.10",
"matchCriteriaId": "D8412E60-1C2F-4764-94F5-563FAA297466"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.25.0",
"versionEndExcluding": "1.25.9",
"matchCriteriaId": "0EC8FEB8-BB13-443C-8905-30B03F8F52E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.26.0",
"versionEndExcluding": "1.26.4",
"matchCriteriaId": "DA35F763-2810-4231-B5A9-93310BF7B765"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3782",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2023-07-19T21:15:10.093",
"lastModified": "2023-07-28T14:57:03.743",
"lastModified": "2023-08-02T18:31:47.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squareup:okhttp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CBF8B08-42F4-4F30-9803-A93BD90A1646"
"criteria": "cpe:2.3:a:squareup:okhttp-brotli:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B91E4D25-67F7-43FA-82FE-72BA4DEB0FD4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38496",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T22:15:10.503",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:32:49.440",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,18 +80,50 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:apptainer:1.2.0:-:*:*:*:go:*:*",
"matchCriteriaId": "7B4FFEA3-9FB9-4B9F-968E-E5C3282B6786"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:apptainer:1.2.0:rc2:*:*:*:go:*:*",
"matchCriteriaId": "35B641D0-6C93-45F0-A297-1BBE3BF65DB6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/apptainer/apptainer/pull/1523",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/apptainer/apptainer/pull/1578",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-38499",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T21:15:10.997",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:11:12.320",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem."
},
{
"lang": "es",
"value": "TYPO3 es un sistema de gesti\u00f3n de contenidos web de c\u00f3digo abierto basado en PHP. A partir de la versi\u00f3n 9.4.0 y antes de las versiones 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, y 12.4.4 en escenarios multi-sitio, la enumeraci\u00f3n de los par\u00e1metros de consulta HTTP \"id\" y \"L\" permit\u00eda el acceso fuera del alcance al contenido renderizado en el frontend del sitio web. Por ejemplo, esto permit\u00eda a los visitantes acceder al contenido de un sitio interno a\u00f1adiendo par\u00e1metros de consulta manuales a la URL de un sitio que estaba disponible p\u00fablicamente. Las versiones de TYPO3 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30 y 12.4.4 corrigen el problema. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +60,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,18 +80,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4.0",
"versionEndExcluding": "9.5.42",
"matchCriteriaId": "F977D03B-2605-4DDA-8E08-9E32862B36FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.4.39",
"matchCriteriaId": "4FD93DD8-F62F-4541-8B1E-0B78A069A9BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.5.30",
"matchCriteriaId": "6CA1BEF0-8CBD-46AE-A155-A010CCE92F6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.4.4",
"matchCriteriaId": "AE209B6F-686B-4896-A7E0-B8426A4818C1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://typo3.org/security/advisory/typo3-core-sa-2023-003",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38500",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T21:15:11.083",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:14:48.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.5.1",
"matchCriteriaId": "694BBC2E-09A9-4001-8B3E-DCDEEDDCA867"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.1.2",
"matchCriteriaId": "75A963C2-ABB8-4AFC-A699-D47FEA291B67"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TYPO3/html-sanitizer/commit/e3026f589fef0be8c3574ee3f0a0bfbe33d7ebdb",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://typo3.org/security/advisory/typo3-core-sa-2023-002",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38501",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T22:15:10.600",
"lastModified": "2023-07-31T19:15:17.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:50:56.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.7",
"matchCriteriaId": "FA6436E9-0F22-49D5-B344-7EE9371CE469"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-3945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T22:15:10.780",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:41:11.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in phpscriptpoint Lawyer 1.6. It has been classified as problematic. This affects an unknown part of the file search.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235401 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en phpscriptpoint Lawyer v1.6. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo \"search.php\". La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). Es posible iniciar el ataque de forma remota. Se ha asignado a esta vulnerabilidad el identificador VDB-235401. NOTA: Se contact\u00f3 con el proveedor con antelaci\u00f3n acerca de esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +97,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpscriptpoint:lawyer:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0213AC35-35CE-4443-8FF6-517BAF3ECDD1"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.235401",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.235401",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,43 @@
"id": "CVE-2023-3947",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-26T04:15:11.117",
"lastModified": "2023-07-26T04:24:59.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-02T19:37:12.583",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Video Conferencing with Zoom plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'vczapi_encrypt_decrypt' function in versions up to, and including, 4.2.1. This makes it possible for unauthenticated attackers to decrypt and view the meeting id and password."
},
{
"lang": "es",
"value": "El plugin Video Conferencing with Zoom para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible debido a que la clave de cifrado est\u00e1 codificada en la funci\u00f3n \"vczapi_encrypt_decrypt\" en versiones hasta la v4.2.1 inclusive. Esto permite a atacantes no autenticados descifrar y ver el identificador y la contrase\u00f1a de la reuni\u00f3n. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
@ -46,18 +70,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imdpen:video_conferencing_with_zoom:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.2.1",
"matchCriteriaId": "D7239604-04BC-4501-859B-DA6ADAC38F57"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/video-conferencing-with-zoom-api/tags/4.2.1/includes/helpers.php#L546",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/video-conferencing-with-zoom-api/trunk/includes/Helpers/Encryption.php?rev=2942302",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba2515d9-ced0-4b49-87c4-04c8391c2608?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-02T18:00:37.396292+00:00
2023-08-02T20:00:31.057053+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-02T18:00:10.260000+00:00
2023-08-02T19:50:56.147000+00:00
```
### Last Data Feed Release
@ -34,46 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `0`
* [CVE-2023-36494](CVE-2023/CVE-2023-364xx/CVE-2023-36494.json) (`2023-08-02T16:15:10.207`)
* [CVE-2023-36858](CVE-2023/CVE-2023-368xx/CVE-2023-36858.json) (`2023-08-02T16:15:10.337`)
* [CVE-2023-38138](CVE-2023/CVE-2023-381xx/CVE-2023-38138.json) (`2023-08-02T16:15:10.440`)
* [CVE-2023-38418](CVE-2023/CVE-2023-384xx/CVE-2023-38418.json) (`2023-08-02T16:15:10.533`)
* [CVE-2023-38419](CVE-2023/CVE-2023-384xx/CVE-2023-38419.json) (`2023-08-02T16:15:10.633`)
* [CVE-2023-38423](CVE-2023/CVE-2023-384xx/CVE-2023-38423.json) (`2023-08-02T16:15:10.730`)
* [CVE-2023-3470](CVE-2023/CVE-2023-34xx/CVE-2023-3470.json) (`2023-08-02T16:15:10.837`)
### CVEs modified in the last Commit
Recently modified CVEs: `134`
Recently modified CVEs: `40`
* [CVE-2023-0045](CVE-2023/CVE-2023-00xx/CVE-2023-0045.json) (`2023-08-02T17:12:50.860`)
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-08-02T17:15:09.650`)
* [CVE-2023-2156](CVE-2023/CVE-2023-21xx/CVE-2023-2156.json) (`2023-08-02T17:15:10.337`)
* [CVE-2023-31248](CVE-2023/CVE-2023-312xx/CVE-2023-31248.json) (`2023-08-02T17:15:10.493`)
* [CVE-2023-34644](CVE-2023/CVE-2023-346xx/CVE-2023-34644.json) (`2023-08-02T17:15:10.937`)
* [CVE-2023-35001](CVE-2023/CVE-2023-350xx/CVE-2023-35001.json) (`2023-08-02T17:15:11.260`)
* [CVE-2023-3390](CVE-2023/CVE-2023-33xx/CVE-2023-3390.json) (`2023-08-02T17:15:11.497`)
* [CVE-2023-3610](CVE-2023/CVE-2023-36xx/CVE-2023-3610.json) (`2023-08-02T17:15:11.637`)
* [CVE-2023-23540](CVE-2023/CVE-2023-235xx/CVE-2023-23540.json) (`2023-08-02T17:15:20.457`)
* [CVE-2023-1890](CVE-2023/CVE-2023-18xx/CVE-2023-1890.json) (`2023-08-02T17:15:26.853`)
* [CVE-2023-2712](CVE-2023/CVE-2023-27xx/CVE-2023-2712.json) (`2023-08-02T17:15:36.950`)
* [CVE-2023-2713](CVE-2023/CVE-2023-27xx/CVE-2023-2713.json) (`2023-08-02T17:15:42.557`)
* [CVE-2023-2703](CVE-2023/CVE-2023-27xx/CVE-2023-2703.json) (`2023-08-02T17:15:46.487`)
* [CVE-2023-2882](CVE-2023/CVE-2023-28xx/CVE-2023-2882.json) (`2023-08-02T17:15:51.977`)
* [CVE-2023-2884](CVE-2023/CVE-2023-28xx/CVE-2023-2884.json) (`2023-08-02T17:15:56.023`)
* [CVE-2023-2885](CVE-2023/CVE-2023-28xx/CVE-2023-2885.json) (`2023-08-02T17:15:59.467`)
* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-08-02T17:16:08.137`)
* [CVE-2023-2887](CVE-2023/CVE-2023-28xx/CVE-2023-2887.json) (`2023-08-02T17:16:19.853`)
* [CVE-2023-1055](CVE-2023/CVE-2023-10xx/CVE-2023-1055.json) (`2023-08-02T17:18:58.570`)
* [CVE-2023-21719](CVE-2023/CVE-2023-217xx/CVE-2023-21719.json) (`2023-08-02T17:19:09.020`)
* [CVE-2023-28261](CVE-2023/CVE-2023-282xx/CVE-2023-28261.json) (`2023-08-02T17:30:14.810`)
* [CVE-2023-28288](CVE-2023/CVE-2023-282xx/CVE-2023-28288.json) (`2023-08-02T17:30:22.453`)
* [CVE-2023-29344](CVE-2023/CVE-2023-293xx/CVE-2023-29344.json) (`2023-08-02T17:30:27.893`)
* [CVE-2023-33140](CVE-2023/CVE-2023-331xx/CVE-2023-33140.json) (`2023-08-02T17:30:35.767`)
* [CVE-2023-3696](CVE-2023/CVE-2023-36xx/CVE-2023-3696.json) (`2023-08-02T17:30:54.240`)
* [CVE-2014-4872](CVE-2014/CVE-2014-48xx/CVE-2014-4872.json) (`2023-08-02T19:00:25.903`)
* [CVE-2014-8270](CVE-2014/CVE-2014-82xx/CVE-2014-8270.json) (`2023-08-02T19:00:29.757`)
* [CVE-2021-39820](CVE-2021/CVE-2021-398xx/CVE-2021-39820.json) (`2023-08-02T18:32:39.680`)
* [CVE-2022-4909](CVE-2022/CVE-2022-49xx/CVE-2022-4909.json) (`2023-08-02T18:25:50.143`)
* [CVE-2022-24767](CVE-2022/CVE-2022-247xx/CVE-2022-24767.json) (`2023-08-02T19:28:28.173`)
* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-08-02T18:15:09.977`)
* [CVE-2023-3782](CVE-2023/CVE-2023-37xx/CVE-2023-3782.json) (`2023-08-02T18:31:47.947`)
* [CVE-2023-35941](CVE-2023/CVE-2023-359xx/CVE-2023-35941.json) (`2023-08-02T18:34:33.230`)
* [CVE-2023-35942](CVE-2023/CVE-2023-359xx/CVE-2023-35942.json) (`2023-08-02T18:36:02.047`)
* [CVE-2023-21405](CVE-2023/CVE-2023-214xx/CVE-2023-21405.json) (`2023-08-02T18:43:09.213`)
* [CVE-2023-35943](CVE-2023/CVE-2023-359xx/CVE-2023-35943.json) (`2023-08-02T18:47:03.400`)
* [CVE-2023-34189](CVE-2023/CVE-2023-341xx/CVE-2023-34189.json) (`2023-08-02T18:51:03.527`)
* [CVE-2023-35929](CVE-2023/CVE-2023-359xx/CVE-2023-35929.json) (`2023-08-02T18:54:38.123`)
* [CVE-2023-34235](CVE-2023/CVE-2023-342xx/CVE-2023-34235.json) (`2023-08-02T19:02:29.150`)
* [CVE-2023-38499](CVE-2023/CVE-2023-384xx/CVE-2023-38499.json) (`2023-08-02T19:11:12.320`)
* [CVE-2023-32232](CVE-2023/CVE-2023-322xx/CVE-2023-32232.json) (`2023-08-02T19:12:35.040`)
* [CVE-2023-38500](CVE-2023/CVE-2023-385xx/CVE-2023-38500.json) (`2023-08-02T19:14:48.317`)
* [CVE-2023-32231](CVE-2023/CVE-2023-322xx/CVE-2023-32231.json) (`2023-08-02T19:17:06.810`)
* [CVE-2023-3384](CVE-2023/CVE-2023-33xx/CVE-2023-3384.json) (`2023-08-02T19:17:31.647`)
* [CVE-2023-22743](CVE-2023/CVE-2023-227xx/CVE-2023-22743.json) (`2023-08-02T19:27:45.450`)
* [CVE-2023-1522](CVE-2023/CVE-2023-15xx/CVE-2023-1522.json) (`2023-08-02T19:32:36.860`)
* [CVE-2023-38496](CVE-2023/CVE-2023-384xx/CVE-2023-38496.json) (`2023-08-02T19:32:49.440`)
* [CVE-2023-3947](CVE-2023/CVE-2023-39xx/CVE-2023-3947.json) (`2023-08-02T19:37:12.583`)
* [CVE-2023-3945](CVE-2023/CVE-2023-39xx/CVE-2023-3945.json) (`2023-08-02T19:41:11.373`)
* [CVE-2023-38501](CVE-2023/CVE-2023-385xx/CVE-2023-38501.json) (`2023-08-02T19:50:56.147`)
## Download and Usage