From aea6bbc39cc8d4381f5a1a25556446479dcd2d05 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 2 Aug 2023 20:00:34 +0000 Subject: [PATCH] Auto-Update: 2023-08-02T20:00:31.057053+00:00 --- CVE-2005/CVE-2005-00xx/CVE-2005-0089.json | 91 +++--- CVE-2006/CVE-2006-49xx/CVE-2006-4980.json | 232 ++++++++------- CVE-2007/CVE-2007-20xx/CVE-2007-2052.json | 149 +++++++--- CVE-2007/CVE-2007-41xx/CVE-2007-4165.json | 32 ++- CVE-2007/CVE-2007-49xx/CVE-2007-4965.json | 304 +++++++++----------- CVE-2008/CVE-2008-01xx/CVE-2008-0198.json | 47 ++- CVE-2008/CVE-2008-04xx/CVE-2008-0491.json | 33 ++- CVE-2008/CVE-2008-06xx/CVE-2008-0615.json | 38 ++- CVE-2008/CVE-2008-06xx/CVE-2008-0616.json | 35 ++- CVE-2008/CVE-2008-06xx/CVE-2008-0617.json | 34 ++- CVE-2008/CVE-2008-06xx/CVE-2008-0618.json | 26 +- CVE-2008/CVE-2008-16xx/CVE-2008-1679.json | 114 ++++++-- CVE-2008/CVE-2008-23xx/CVE-2008-2316.json | 127 ++++---- CVE-2008/CVE-2008-31xx/CVE-2008-3143.json | 158 +++++----- CVE-2008/CVE-2008-31xx/CVE-2008-3144.json | 297 ++++++++----------- CVE-2014/CVE-2014-48xx/CVE-2014-4872.json | 20 +- CVE-2014/CVE-2014-82xx/CVE-2014-8270.json | 18 +- CVE-2021/CVE-2021-398xx/CVE-2021-39820.json | 4 +- CVE-2022/CVE-2022-247xx/CVE-2022-24767.json | 18 +- CVE-2022/CVE-2022-49xx/CVE-2022-4909.json | 72 ++++- CVE-2023/CVE-2023-15xx/CVE-2023-1522.json | 10 +- CVE-2023/CVE-2023-214xx/CVE-2023-21405.json | 247 +++++++++++++++- CVE-2023/CVE-2023-227xx/CVE-2023-22743.json | 28 +- CVE-2023/CVE-2023-281xx/CVE-2023-28130.json | 8 +- CVE-2023/CVE-2023-322xx/CVE-2023-32231.json | 75 ++++- CVE-2023/CVE-2023-322xx/CVE-2023-32232.json | 75 ++++- CVE-2023/CVE-2023-33xx/CVE-2023-3384.json | 64 ++++- CVE-2023/CVE-2023-341xx/CVE-2023-34189.json | 60 +++- CVE-2023/CVE-2023-342xx/CVE-2023-34235.json | 53 +++- CVE-2023/CVE-2023-359xx/CVE-2023-35929.json | 75 ++++- CVE-2023/CVE-2023-359xx/CVE-2023-35941.json | 69 ++++- CVE-2023/CVE-2023-359xx/CVE-2023-35942.json | 70 ++++- CVE-2023/CVE-2023-359xx/CVE-2023-35943.json | 70 ++++- CVE-2023/CVE-2023-37xx/CVE-2023-3782.json | 6 +- CVE-2023/CVE-2023-384xx/CVE-2023-38496.json | 74 ++++- CVE-2023/CVE-2023-384xx/CVE-2023-38499.json | 95 +++++- CVE-2023/CVE-2023-385xx/CVE-2023-38500.json | 65 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38501.json | 58 +++- CVE-2023/CVE-2023-39xx/CVE-2023-3945.json | 58 +++- CVE-2023/CVE-2023-39xx/CVE-2023-3947.json | 63 +++- README.md | 65 ++--- 41 files changed, 2310 insertions(+), 927 deletions(-) diff --git a/CVE-2005/CVE-2005-00xx/CVE-2005-0089.json b/CVE-2005/CVE-2005-00xx/CVE-2005-0089.json index b139ac600ff..19a2b0d18ee 100644 --- a/CVE-2005/CVE-2005-00xx/CVE-2005-0089.json +++ b/CVE-2005/CVE-2005-00xx/CVE-2005-0089.json @@ -2,8 +2,8 @@ "id": "CVE-2005-0089", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-10-11T01:29:50.543", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:04:41.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -58,38 +58,14 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5F19339B-AAA0-4042-895C-4A21C051285C" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.5", + "matchCriteriaId": "947C0E11-0B3B-439D-AE55-C8AF48A2013E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4" + "criteria": "cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FE315FF0-8715-4FF6-ADBD-AD99AB0D0882" } ] } @@ -99,56 +75,89 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=110746469728728&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://python.org/security/PSF-2005-001/patch-2.2.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://securitytracker.com/id?1013083", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.debian.org/security/2005/dsa-666", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "Third Party Advisory" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.python.org/security/PSF-2005-001/", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-108.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/12437", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.trustix.org/errata/2005/0003/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19217", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9811", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-49xx/CVE-2006-4980.json b/CVE-2006/CVE-2006-49xx/CVE-2006-4980.json index 1c3d787e3ff..72ef1ac397c 100644 --- a/CVE-2006/CVE-2006-49xx/CVE-2006-4980.json +++ b/CVE-2006/CVE-2006-49xx/CVE-2006-4980.json @@ -2,8 +2,8 @@ "id": "CVE-2006-4980", "sourceIdentifier": "cve@mitre.org", "published": "2006-10-10T04:06:00.000", - "lastModified": "2018-10-17T21:40:40.327", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:04:54.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -69,88 +69,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.6", + "matchCriteriaId": "9166CB74-7623-44E6-9E68-A00768A8A870" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "130E7AE9-EC3B-4E46-89BE-35ABC1CFACAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4284452B-A664-4974-A64D-3BD6E7BDE886" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ABA70292-BAD3-4C41-BCAB-D7F49EE00066" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_alpha_1:*:*:*:*:*:*:*", - "matchCriteriaId": "474CC2B2-ED66-43A7-A96C-F1C70872C230" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_alpha_2:*:*:*:*:*:*:*", - "matchCriteriaId": "7EE97837-C2E7-4C5E-81B3-8BE38FC8DD32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_beta_1:*:*:*:*:*:*:*", - "matchCriteriaId": "B4534811-A18D-46AB-8ABB-9760F43D1D41" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_beta_2:*:*:*:*:*:*:*", - "matchCriteriaId": "6CBF058C-11E9-4B74-93D1-9FFD3F49FAB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_beta_3:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AD42C6-6D13-4043-BB96-DE4E4BFCE5D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_final:*:*:*:*:*:*:*", - "matchCriteriaId": "7C93C70B-D3F7-426E-B2CC-54A0DAF9F4CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_release_candidate_1:*:*:*:*:*:*:*", - "matchCriteriaId": "489B6753-7F90-497E-B24C-D6C3763F59F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5_release_candidate_2:*:*:*:*:*:*:*", - "matchCriteriaId": "296B7B95-C7A0-4863-A468-BF2448D74156" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.4.0", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "6254AFCD-2750-4FD2-8139-8A4BC07B0D06" } ] } @@ -160,111 +88,199 @@ "references": [ { "url": "ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200610-07.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1017019", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2006/dsa-1197", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2006/dsa-1198", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:181", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_25_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0713.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/448244/100/100/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/456546/100/200/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/20376", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-359-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/3940", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/5131", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29408", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-702", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-20xx/CVE-2007-2052.json b/CVE-2007/CVE-2007-20xx/CVE-2007-2052.json index 76eb8e7a3e3..6892cf67580 100644 --- a/CVE-2007/CVE-2007-20xx/CVE-2007-2052.json +++ b/CVE-2007/CVE-2007-20xx/CVE-2007-2052.json @@ -2,8 +2,8 @@ "id": "CVE-2007-2052", "sourceIdentifier": "cve@mitre.org", "published": "2007-04-16T22:19:00.000", - "lastModified": "2018-10-16T16:41:42.710", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:04:59.803", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -55,7 +55,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-193" } ] } @@ -69,13 +69,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4" + "criteria": "cpe:2.3:a:python:python:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FE315FF0-8715-4FF6-ADBD-AD99AB0D0882" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "09FC837C-CA10-4F04-A537-A6C759C7BE69" + "criteria": "cpe:2.3:a:python:python:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690CBE11-2D97-4D59-A21C-2AC388E67273" } ] } @@ -85,103 +85,188 @@ "references": [ { "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1551", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1620", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:099", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.python.org/download/releases/2.5.1/NEWS.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/469294/30/6450/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/23887", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.trustix.org/errata/2007/0019/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/usn-585-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/1465", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/0637", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/3316", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34060", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-1358", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-41xx/CVE-2007-4165.json b/CVE-2007/CVE-2007-41xx/CVE-2007-4165.json index c347da2346b..ab69baba3c5 100644 --- a/CVE-2007/CVE-2007-41xx/CVE-2007-4165.json +++ b/CVE-2007/CVE-2007-41xx/CVE-2007-4165.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4165", "sourceIdentifier": "cve@mitre.org", "published": "2007-08-07T10:17:00.000", - "lastModified": "2017-07-29T01:32:45.457", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:59:17.273", + "vulnStatus": "Analyzed", "evaluatorComment": "http://xuyiyang.com/wordpress-themes/blue-memories - This website is the homepage of Blue Memories 1.5 theme for Wordpress. The theme was developed by Xu Yiyang.", "descriptions": [ { @@ -49,7 +49,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-79" } ] } @@ -63,13 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xu_yiyang:blue_memories_theme:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D1AE75A8-05AF-4043-94A9-88464E3C22F0" + "criteria": "cpe:2.3:a:xuyiyang:blue_memories_theme:1.5:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "B23D7726-7449-4085-BF29-ADF3EBD59203" } ] } @@ -79,15 +74,26 @@ "references": [ { "url": "http://www.securityfocus.com/bid/25215", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://xuyiyang.com/2007/06/22/blue-memories-and-spring-updated/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35817", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-49xx/CVE-2007-4965.json b/CVE-2007/CVE-2007-49xx/CVE-2007-4965.json index 1b1a67cfd77..19ea2842b6c 100644 --- a/CVE-2007/CVE-2007-49xx/CVE-2007-4965.json +++ b/CVE-2007/CVE-2007-49xx/CVE-2007-4965.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4965", "sourceIdentifier": "cve@mitre.org", "published": "2007-09-18T22:17:00.000", - "lastModified": "2018-10-15T21:39:00.410", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:52:26.423", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -55,7 +55,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -69,138 +69,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "142541D5-63E0-4D2A-AD37-AC13CCA9B9DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DAEF6FB8-82E9-402B-B8BF-F95A4DD799AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "500B365C-D6BF-46F8-9200-6ED48A44355C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8A08655B-5227-43A0-B645-07B615CC46FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "13D0B367-52C0-4240-8126-1248314F1990" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5F19339B-AAA0-4042-895C-4A21C051285C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "08050FA1-95FB-4308-A6C2-622591C79BEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "422F7E41-F437-4441-8692-B45C41204CCB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "130E7AE9-EC3B-4E46-89BE-35ABC1CFACAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9812A290-060A-4632-8A5D-475EDAD754D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FBCBBC84-0F63-4BBC-9612-4D2FD74F6D91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4284452B-A664-4974-A64D-3BD6E7BDE886" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ABA70292-BAD3-4C41-BCAB-D7F49EE00066" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1582AC09-AD12-4411-B875-F2AB8DAA32B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "09FC837C-CA10-4F04-A537-A6C759C7BE69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BF212333-E797-4BB3-8BF7-4D51B52314D5" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.1", + "matchCriteriaId": "E17596CE-794B-43AF-BD92-CB3C490B3CB4" } ] } @@ -210,19 +81,31 @@ "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://docs.info.apple.com/article.html?artnum=307179", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html", @@ -233,125 +116,212 @@ }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.avaya.com/css/P8/documents/100074697", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1551", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1620", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/25696", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.ubuntu.com/usn/usn-585-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/3201", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/4238", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/0637", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/3316", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-1885", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-01xx/CVE-2008-0198.json b/CVE-2008/CVE-2008-01xx/CVE-2008-0198.json index f51a6faa5e8..bcc231ae4ce 100644 --- a/CVE-2008/CVE-2008-01xx/CVE-2008-0198.json +++ b/CVE-2008/CVE-2008-01xx/CVE-2008-0198.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0198", "sourceIdentifier": "cve@mitre.org", "published": "2008-01-10T00:46:00.000", - "lastModified": "2018-10-15T21:58:33.123", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T19:11:11.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" + "criteria": "cpe:2.3:a:wp-contactform_project:wp-contactform:1.5:alpha:*:*:*:wordpress:*:*", + "matchCriteriaId": "C059DC29-0801-4CA4-A9E9-CC3A5C73D40A" } ] } @@ -75,32 +75,57 @@ "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory" ] }, { "url": "http://securityreason.com/securityalert/3539", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://securityvulns.ru/Sdocument546.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://securityvulns.ru/Sdocument667.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://websecurity.com.ua/1600/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://websecurity.com.ua/1641/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/485786/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-04xx/CVE-2008-0491.json b/CVE-2008/CVE-2008-04xx/CVE-2008-0491.json index 13ab1d8846d..98c12574d0b 100644 --- a/CVE-2008/CVE-2008-04xx/CVE-2008-0491.json +++ b/CVE-2008/CVE-2008-04xx/CVE-2008-0491.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0491", "sourceIdentifier": "cve@mitre.org", "published": "2008-01-30T22:00:00.000", - "lastModified": "2017-09-29T01:30:18.533", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:59:11.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,13 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:fgallery_plugin:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E418EB0D-142E-4B62-9063-8BD58F5E7660" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" + "criteria": "cpe:2.3:a:fgallery_project:fgallery:2.4.1:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "A6CF4418-D3B2-474E-87CB-AACD26CF8D46" } ] } @@ -80,20 +75,32 @@ "url": "http://www.securityfocus.com/bid/27464", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2008/0349", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39964", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/4993", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-06xx/CVE-2008-0615.json b/CVE-2008/CVE-2008-06xx/CVE-2008-0615.json index f35e709a743..7f925d11f70 100644 --- a/CVE-2008/CVE-2008-06xx/CVE-2008-0615.json +++ b/CVE-2008/CVE-2008-06xx/CVE-2008-0615.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0615", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-06T12:00:00.000", - "lastModified": "2018-10-15T22:02:12.820", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T19:05:18.393", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,18 +62,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dmsguestbook:dmsguestbook:1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "5CCC6E14-B072-4C5C-8840-1C159347A4F1" + "criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:dmsguestbook:dmsguestbook:1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5039D99E-D075-4687-B913-D33FD16C8E9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" + "criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.8.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "E2DD6F12-A5D0-4F56-9156-5643AE71851A" } ] } @@ -83,22 +78,35 @@ "references": [ { "url": "http://securityreason.com/securityalert/3615", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/27575", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://www.exploit-db.com/exploits/5035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-06xx/CVE-2008-0616.json b/CVE-2008/CVE-2008-06xx/CVE-2008-0616.json index 5e1df2a2366..f024f61b61e 100644 --- a/CVE-2008/CVE-2008-06xx/CVE-2008-0616.json +++ b/CVE-2008/CVE-2008-06xx/CVE-2008-0616.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0616", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-06T12:00:00.000", - "lastModified": "2018-10-15T22:02:13.273", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:59:02.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,13 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dmsguestbook:dmsguestbook:1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "5CCC6E14-B072-4C5C-8840-1C159347A4F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" + "criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3" } ] } @@ -78,19 +73,33 @@ "references": [ { "url": "http://securityreason.com/securityalert/3615", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40196", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.exploit-db.com/exploits/5035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-06xx/CVE-2008-0617.json b/CVE-2008/CVE-2008-06xx/CVE-2008-0617.json index 3a23dba93d2..2511d70dc63 100644 --- a/CVE-2008/CVE-2008-06xx/CVE-2008-0617.json +++ b/CVE-2008/CVE-2008-06xx/CVE-2008-0617.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0617", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-06T12:00:00.000", - "lastModified": "2018-10-15T22:02:13.697", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:59:07.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,13 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:daniel_m._schurter:dmsguestbook:1.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B8C0850C-2EF9-44F0-A229-3F41BDB8A269" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" + "criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3" } ] } @@ -78,22 +73,35 @@ "references": [ { "url": "http://securityreason.com/securityalert/3615", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/487437/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/27575", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://www.exploit-db.com/exploits/5035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-06xx/CVE-2008-0618.json b/CVE-2008/CVE-2008-06xx/CVE-2008-0618.json index 2d57dab2483..6fe942b0b65 100644 --- a/CVE-2008/CVE-2008-06xx/CVE-2008-0618.json +++ b/CVE-2008/CVE-2008-06xx/CVE-2008-0618.json @@ -2,7 +2,7 @@ "id": "CVE-2008-0618", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-06T12:00:00.000", - "lastModified": "2008-09-05T21:35:33.430", + "lastModified": "2023-08-02T18:59:22.963", "vulnStatus": "Analyzed", "descriptions": [ { @@ -62,23 +62,27 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:daniel_m._schurter:dmsguestbook:1.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B8C0850C-2EF9-44F0-A229-3F41BDB8A269" + "criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.7.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "6F59AA6B-7033-42EA-B66A-EA67E4B002E3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:daniel_m._schurter:dmsguestbook:1.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "80D8D494-6580-4FC0-AED8-96D5AB5AAF8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9" + "criteria": "cpe:2.3:a:dmsguestbook_project:dmsguestbook:1.8.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "E2DD6F12-A5D0-4F56-9156-5643AE71851A" } ] } ] } ], - "references": [] + "references": [ + { + "url": "http://secunia.com/advisories/28759", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + } + ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-16xx/CVE-2008-1679.json b/CVE-2008/CVE-2008-16xx/CVE-2008-1679.json index 0a5d08951b1..638ee311421 100644 --- a/CVE-2008/CVE-2008-16xx/CVE-2008-1679.json +++ b/CVE-2008/CVE-2008-16xx/CVE-2008-1679.json @@ -2,8 +2,8 @@ "id": "CVE-2008-1679", "sourceIdentifier": "cve@mitre.org", "published": "2008-04-22T04:41:00.000", - "lastModified": "2017-09-29T01:30:49.317", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:52:56.997", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -55,7 +55,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -69,14 +69,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.5.2", - "matchCriteriaId": "107216B7-C3A3-4A47-8E0B-2377C4A24357" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.3", + "matchCriteriaId": "34F10529-2CBD-4C4E-93EB-CCFFAA669647" } ] } @@ -86,82 +81,141 @@ "references": [ { "url": "http://bugs.python.org/issue1179", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://bugs.python.org/msg64682", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200807-01.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.avaya.com/css/P8/documents/100074697", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0149", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1551", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "Third Party Advisory" ] }, { "url": "http://www.debian.org/security/2008/dsa-1620", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:164", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/usn-632-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41958", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-2424", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10583", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7800", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-23xx/CVE-2008-2316.json b/CVE-2008/CVE-2008-23xx/CVE-2008-2316.json index 8df27c80570..fb855e63c36 100644 --- a/CVE-2008/CVE-2008-23xx/CVE-2008-2316.json +++ b/CVE-2008/CVE-2008-23xx/CVE-2008-2316.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2316", "sourceIdentifier": "cve@mitre.org", "published": "2008-08-01T14:41:00.000", - "lastModified": "2018-10-11T20:40:12.330", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:52:37.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -69,48 +69,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "72BBBBEB-FD14-4452-84F7-1954312A4995" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "00DEEEDB-98B2-43FE-A1B2-340294097399" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BF212333-E797-4BB3-8BF7-4D51B52314D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C38CD209-A46D-4DDB-BA05-3B0E894371C8" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "9E0806D1-04EA-492A-8587-1886F47ECC80" } ] } @@ -127,63 +88,111 @@ }, { "url": "http://bugs.gentoo.org/show_bug.cgi?id=230640", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200807-16.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0243", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/495445/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30491", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-632-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2288", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44173", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44174", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-31xx/CVE-2008-3143.json b/CVE-2008/CVE-2008-31xx/CVE-2008-3143.json index 76dd640cb69..f4d1078c0de 100644 --- a/CVE-2008/CVE-2008-31xx/CVE-2008-3143.json +++ b/CVE-2008/CVE-2008-31xx/CVE-2008-3143.json @@ -2,8 +2,8 @@ "id": "CVE-2008-3143", "sourceIdentifier": "cve@mitre.org", "published": "2008-08-01T14:41:00.000", - "lastModified": "2018-10-11T20:47:15.690", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:50:51.167", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,11 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" - }, - { - "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-190" } ] } @@ -66,44 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.5.1", - "matchCriteriaId": "3C2E61BC-2CAE-4B54-A86E-AF4A72A7A9D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "72BBBBEB-FD14-4452-84F7-1954312A4995" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "00DEEEDB-98B2-43FE-A1B2-340294097399" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.12", + "matchCriteriaId": "CB298734-933B-4BBD-9E94-2B6BA78833F5" } ] } @@ -113,83 +74,150 @@ "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=232137", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200807-16.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://svn.python.org/view?rev=60793&view=rev", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0243", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1667", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:164", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.python.org/download/releases/2.5.2/NEWS.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.python.org/download/releases/2.6/NEWS.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/495445/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30491", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-632-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2288", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/3316", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7720", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8996", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-31xx/CVE-2008-3144.json b/CVE-2008/CVE-2008-31xx/CVE-2008-3144.json index 7a2711bec57..366222b839c 100644 --- a/CVE-2008/CVE-2008-31xx/CVE-2008-3144.json +++ b/CVE-2008/CVE-2008-31xx/CVE-2008-3144.json @@ -2,8 +2,8 @@ "id": "CVE-2008-3144", "sourceIdentifier": "cve@mitre.org", "published": "2008-08-01T14:41:00.000", - "lastModified": "2018-10-11T20:47:18.770", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:52:53.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -62,153 +62,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9FA5B2AA-D431-4B75-B6DC-9E2B9390FD98" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "142541D5-63E0-4D2A-AD37-AC13CCA9B9DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2652E2F4-C7F0-43E4-8D87-91C5F363B8EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DAEF6FB8-82E9-402B-B8BF-F95A4DD799AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FF5DC6AB-B1FD-4F87-9651-5B998AD334ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "500B365C-D6BF-46F8-9200-6ED48A44355C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8A08655B-5227-43A0-B645-07B615CC46FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "13D0B367-52C0-4240-8126-1248314F1990" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3A1303B8-9C3E-4231-9EF2-C3BA7A54B7B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5F19339B-AAA0-4042-895C-4A21C051285C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "08050FA1-95FB-4308-A6C2-622591C79BEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "422F7E41-F437-4441-8692-B45C41204CCB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "99E9F540-777F-4BD2-B44B-EABE311BAC58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E0807131-7BF9-475F-B42B-25EFD46A96BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "080ED7C9-3348-49D8-937D-83A0D629374B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "11523A7B-F557-4E74-B892-5F7D05FE973F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A3945EBB-D386-4995-BF95-A7AC5E163E1C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DE249685-99F0-4ECB-A2E9-F3E306D87E02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "130E7AE9-EC3B-4E46-89BE-35ABC1CFACAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9812A290-060A-4632-8A5D-475EDAD754D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "72BBBBEB-FD14-4452-84F7-1954312A4995" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A9AFAD75-1916-44AC-825C-47F8BDC3A8F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FBCBBC84-0F63-4BBC-9612-4D2FD74F6D91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4284452B-A664-4974-A64D-3BD6E7BDE886" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ABA70292-BAD3-4C41-BCAB-D7F49EE00066" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "1582AC09-AD12-4411-B875-F2AB8DAA32B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "00DEEEDB-98B2-43FE-A1B2-340294097399" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "09FC837C-CA10-4F04-A537-A6C759C7BE69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BF212333-E797-4BB3-8BF7-4D51B52314D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:python_software_foundation:python:2.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C38CD209-A46D-4DDB-BA05-3B0E894371C8" + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.5.2", + "matchCriteriaId": "9E0806D1-04EA-492A-8587-1886F47ECC80" } ] } @@ -218,7 +74,10 @@ "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=232137", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://bugs.python.org/issue2588", @@ -229,103 +88,189 @@ }, { "url": "http://bugs.python.org/issue2589", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200807-16.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.525289", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT3438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://svn.python.org/view?rev=63728&view=rev", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://svn.python.org/view?rev=63734&view=rev", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://svn.python.org/view?rev=63883&view=rev", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "http://wiki.rpath.com/Advisories:rPSA-2008-0243", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2008/dsa-1667", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:163", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:164", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5032900", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/495445/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30491", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-632-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2288", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/3316", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44171", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44173", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10170", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7725", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json b/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json index 407dca7322a..c7d34aadebe 100644 --- a/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json +++ b/CVE-2014/CVE-2014-48xx/CVE-2014-4872.json @@ -2,7 +2,7 @@ "id": "CVE-2014-4872", "sourceIdentifier": "cret@cert.org", "published": "2014-10-10T10:55:07.523", - "lastModified": "2016-06-29T14:33:12.517", + "lastModified": "2023-08-02T19:00:25.903", "vulnStatus": "Analyzed", "evaluatorComment": "CWE-306: Missing Authentication for Critical Function", "descriptions": [ @@ -49,7 +49,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-306" } ] } @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bmc:bmc_track-it\\!:11.3.0.355:*:*:*:*:*:*:*", - "matchCriteriaId": "DAEF873F-118E-4049-BBC3-ADC4F2D58DED" + "criteria": "cpe:2.3:a:bmc:track-it\\!:11.3.0.355:*:*:*:*:*:*:*", + "matchCriteriaId": "5E1E260D-357B-4F49-B910-33178F0F29E4" } ] } @@ -74,7 +74,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kb.cert.org/vuls/id/121036", @@ -86,7 +90,11 @@ }, { "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json b/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json index ab2589982d2..5380c552191 100644 --- a/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json +++ b/CVE-2014/CVE-2014-82xx/CVE-2014-8270.json @@ -2,7 +2,7 @@ "id": "CVE-2014-8270", "sourceIdentifier": "cret@cert.org", "published": "2014-12-12T11:59:05.657", - "lastModified": "2014-12-12T20:38:29.197", + "lastModified": "2023-08-02T19:00:29.757", "vulnStatus": "Analyzed", "descriptions": [ { @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bmc:bmc_track-it\\!:11.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3A2AD228-34B3-435C-B456-5D56F0E6603C" + "criteria": "cpe:2.3:a:bmc:track-it\\!:11.3:*:*:*:*:*:*:*", + "matchCriteriaId": "15256367-4248-4A39-B8BC-D10C4E6B8549" } ] } @@ -73,11 +73,19 @@ "references": [ { "url": "http://support.numarasoftware.com/support/articles.asp?how=%20AND%20&mode=detail&kcriteria=7508&ID=7654", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-419/", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-398xx/CVE-2021-39820.json b/CVE-2021/CVE-2021-398xx/CVE-2021-39820.json index c271d98dbe3..e0e882be4ea 100644 --- a/CVE-2021/CVE-2021-398xx/CVE-2021-39820.json +++ b/CVE-2021/CVE-2021-398xx/CVE-2021-39820.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39820", "sourceIdentifier": "psirt@adobe.com", "published": "2022-06-15T17:15:08.403", - "lastModified": "2023-08-01T09:15:09.630", - "vulnStatus": "Modified", + "lastModified": "2023-08-02T18:32:39.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-247xx/CVE-2022-24767.json b/CVE-2022/CVE-2022-247xx/CVE-2022-24767.json index 297bac7f35c..0445c942273 100644 --- a/CVE-2022/CVE-2022-247xx/CVE-2022-24767.json +++ b/CVE-2022/CVE-2022-247xx/CVE-2022-24767.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24767", "sourceIdentifier": "security-advisories@github.com", "published": "2022-04-12T18:15:09.510", - "lastModified": "2022-04-21T14:05:38.687", + "lastModified": "2023-08-02T19:28:28.173", "vulnStatus": "Analyzed", "descriptions": [ { @@ -127,6 +127,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.35.2", + "matchCriteriaId": "2C4FF412-E806-4D42-AA6A-FE021BCD9829" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json index 03bb4111d1a..aa50ae70051 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json @@ -2,23 +2,85 @@ "id": "CVE-2022-4909", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:10.970", - "lastModified": "2023-07-31T12:54:58.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:25:50.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in XML in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially perform an ASLR bypass via a crafted HTML page. (Chromium security severity: Low)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "107.0.5304.62", + "matchCriteriaId": "6E3E8C15-896B-4126-A53A-771C50A24E4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://crbug.com/1356211", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json index 04533da75c8..46a09d58f16 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1522", "sourceIdentifier": "security@genetec.com", "published": "2023-04-05T19:15:07.737", - "lastModified": "2023-04-17T16:58:08.303", + "lastModified": "2023-08-02T19:32:36.860", "vulnStatus": "Analyzed", "descriptions": [ { @@ -65,13 +65,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:genetech:security_center:-:*:*:*:saas:*:*:*", - "matchCriteriaId": "3F917F63-BFDA-4F61-B8B9-EB98E93CFDAA" + "criteria": "cpe:2.3:a:genetec:security_center:-:*:*:*:saas:*:*:*", + "matchCriteriaId": "BC6A00E1-99F4-45AD-BCF9-2FF49A6914BE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:genetech:security_center:5.11.2:*:*:*:-:*:*:*", - "matchCriteriaId": "76B67AA7-C1AF-4CD6-8761-0FDD43CC40C0" + "criteria": "cpe:2.3:a:genetec:security_center:5.11.2:*:*:*:-:*:*:*", + "matchCriteriaId": "4E268371-964A-4886-A5E9-9678F487C950" } ] } diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json index 785fd5083af..933e0c37142 100644 --- a/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json +++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21405.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21405", "sourceIdentifier": "product-security@axis.com", "published": "2023-07-25T08:15:09.927", - "lastModified": "2023-07-25T13:00:59.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:43:09.213", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -34,10 +54,231 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.65.4", + "matchCriteriaId": "250BA4C3-1498-4C31-9199-ED26336E4467" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17AB03CB-201D-4838-AA48-EE2BEABB1DDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1210_\\(-b\\)_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.6.16.0", + "matchCriteriaId": "1025D3EF-359A-42F8-A6F3-A1A913BC84FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:axis:a1210_\\(-b\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1CDF5C3-76A2-4D39-91C7-0F6D76EA2D0C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1601_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.84.4", + "matchCriteriaId": "0CF7DD49-AC16-4AF1-BCFF-7E9B385C17D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1601_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndIncluding": "10.12.171.0", + "matchCriteriaId": "6ADF9CDC-B131-4568-9E40-51534D18B033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1601_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.6.16.0", + "matchCriteriaId": "4AF50B3C-1DBC-4B90-8437-8FFB40878611" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:axis:a1601:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D256893-7BD3-40A6-9877-2DED01770AC5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1610_\\(-b\\)_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.12.171.0", + "matchCriteriaId": "650F99B2-0A4E-4642-BFEE-83E137EE1940" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:a1610_\\(-b\\)_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.6.16.0", + "matchCriteriaId": "B19B16FF-93F4-46BF-B629-3FDE840EAE2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:axis:a1610_\\(-b\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "02A7D1B6-D87A-47DF-8CB4-76AD56B450EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.12.178", + "matchCriteriaId": "ED306393-885B-4898-95C7-CE5F61B96ED2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.5.53", + "matchCriteriaId": "352DA079-F861-49FF-AA51-F98F1188DFFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:axis:a8207:-:*:*:*:*:*:*:*", + "matchCriteriaId": "498E4857-D25F-4827-8328-023B02A64006" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*", + "versionEndIncluding": "10.12.178", + "matchCriteriaId": "ED306393-885B-4898-95C7-CE5F61B96ED2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.5.53", + "matchCriteriaId": "352DA079-F861-49FF-AA51-F98F1188DFFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:axis:a8207_mkii:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AEF2999-77C1-4B5D-A633-FCE9E49F8376" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.axis.com/dam/public/7f/3a/ed/cve-2023-21405-en-US-407244.pdf", - "source": "product-security@axis.com" + "source": "product-security@axis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22743.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22743.json index 823e77d402b..6730ec0c4ca 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22743.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22743.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22743", "sourceIdentifier": "security-advisories@github.com", "published": "2023-02-14T21:15:12.547", - "lastModified": "2023-02-23T21:46:18.030", + "lastModified": "2023-08-02T19:27:45.450", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,24 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.35.2", - "matchCriteriaId": "2C4FF412-E806-4D42-AA6A-FE021BCD9829" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.39.2", - "matchCriteriaId": "5EEE9C90-8812-4263-A041-F0207B29AF3C" + "matchCriteriaId": "613F976A-860B-4267-8364-74D7BC74030D" } ] } @@ -143,14 +127,18 @@ "url": "https://learn.microsoft.com/en-us/windows/win32/controls/cookbook-overview?redirectedfrom=MSDN#using-comctl32dll-version-6-in-an-application-that-uses-only-standard-extensions", "source": "security-advisories@github.com", "tags": [ - "Technical Description" + "Patch", + "Technical Description", + "Vendor Advisory" ] }, { "url": "https://learn.microsoft.com/en-us/windows/win32/sbscs/about-side-by-side-assemblies-", "source": "security-advisories@github.com", "tags": [ - "Technical Description" + "Patch", + "Technical Description", + "Vendor Advisory" ] } ] diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json index 06f8425db80..1be101696db 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28130", "sourceIdentifier": "cve@checkpoint.com", "published": "2023-07-26T11:15:09.550", - "lastModified": "2023-08-02T12:15:10.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:15:09.977", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html", + "source": "cve@checkpoint.com" + }, { "url": "http://seclists.org/fulldisclosure/2023/Aug/4", "source": "cve@checkpoint.com" diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32231.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32231.json index aacc3dcc7a0..2c1fc750369 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32231.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32231.json @@ -2,27 +2,90 @@ "id": "CVE-2023-32231", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-25T01:15:09.107", - "lastModified": "2023-07-25T13:01:04.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:17:06.810", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.818. During installation, binaries gets executed out of a subfolder in C:\\Windows\\Temp. A standard user can create the folder and path file ahead of time and obtain elevated code execution." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vasion:printerlogic_client:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "25.0.0.818", + "matchCriteriaId": "1744F408-10F1-47F7-9CF1-624B7D74B0B5" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Client_Release_Notes.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Security_Bulletin_CVE.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.vasion.com/press-releases/printerlogic-rebrands", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32232.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32232.json index f5439615d8d..569b19761a6 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32232.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32232.json @@ -2,27 +2,90 @@ "id": "CVE-2023-32232", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-25T01:15:09.177", - "lastModified": "2023-07-25T13:01:04.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:12:35.040", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.836. During client installation and repair, a PrinterLogic binary is called by the installer to configure the device. This window is not hidden, and is running with elevated privileges. A standard user can break out of this window, obtaining a full SYSTEM command prompt window. This results in complete compromise via arbitrary SYSTEM code execution (elevation of privileges)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vasion:printerlogic_client:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "25.0.0.836", + "matchCriteriaId": "BEC08A07-C876-48D8-865E-26D136EDC2B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Client_Release_Notes.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.printercloud.com/1-Printerlogic/Release_Notes/Security_Bulletin_CVE.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.vasion.com/press-releases/printerlogic-rebrands", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3384.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3384.json index e23ddfc8c20..d958b7223c4 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3384.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3384.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3384", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:12.523", - "lastModified": "2023-07-25T13:01:09.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:17:31.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -34,14 +54,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-3384", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216924", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json index d53950a59da..0b5eacf6a47 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34189.json @@ -2,15 +2,38 @@ "id": "CVE-2023-34189", "sourceIdentifier": "security@apache.org", "published": "2023-07-25T08:15:10.077", - "lastModified": "2023-07-25T13:00:59.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:51:03.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could use general users to delete and update the process, which only the admin can operate occurrences.\u00a0\n\nUsers are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8109 \u00a0to solve it.\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -23,14 +46,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndIncluding": "1.7.0", + "matchCriteriaId": "A758C808-F9C0-43D5-8061-DA3A69751D21" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/07/25/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/smxqyx43hxjvzv4w71n2n3rfho9p378s", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34235.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34235.json index 8df9075ca3c..53d6659253c 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34235.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34235.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34235", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T18:15:10.800", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:02:29.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.10.8", + "matchCriteriaId": "BA7C9D2E-E4B5-4BA7-9174-51A805D34E39" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/strapi/strapi/releases/tag/v4.10.8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35929.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35929.json index 56656b26ca1..5c9c70a70bd 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35929.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35929.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35929", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T18:15:10.897", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:54:38.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "14.9-5", + "matchCriteriaId": "22469E90-AD27-4AE7-B3EE-AA093211124D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", + "versionEndExcluding": "14.10.99.4", + "matchCriteriaId": "988A3CB6-2246-4A0C-90E9-7D0D647B3EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "14.10", + "versionEndExcluding": "14.10-2", + "matchCriteriaId": "1D6E5BBF-1DA0-4F5E-BC10-2E8201BF244C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0b2945fbd260d37aa0aff2ca1c867d160f76188d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=32629", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35941.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35941.json index 84affbfc6c6..97906648107 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35941.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35941.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35941", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T18:15:10.993", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:34:33.230", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +66,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.23.0", + "versionEndExcluding": "1.23.12", + "matchCriteriaId": "588736F6-2FDC-4CF7-AFFA-7CFE16ED6EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.24.0", + "versionEndExcluding": "1.24.10", + "matchCriteriaId": "D8412E60-1C2F-4764-94F5-563FAA297466" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.25.9", + "matchCriteriaId": "0EC8FEB8-BB13-443C-8905-30B03F8F52E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.26.0", + "versionEndExcluding": "1.26.4", + "matchCriteriaId": "DA35F763-2810-4231-B5A9-93310BF7B765" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35942.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35942.json index 80b931d9ac8..0ce230ffd38 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35942.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35942.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35942", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T19:15:11.050", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:36:02.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +66,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.23.0", + "versionEndExcluding": "1.23.12", + "matchCriteriaId": "588736F6-2FDC-4CF7-AFFA-7CFE16ED6EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.24.0", + "versionEndExcluding": "1.24.10", + "matchCriteriaId": "D8412E60-1C2F-4764-94F5-563FAA297466" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.25.9", + "matchCriteriaId": "0EC8FEB8-BB13-443C-8905-30B03F8F52E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.26.0", + "versionEndExcluding": "1.26.4", + "matchCriteriaId": "DA35F763-2810-4231-B5A9-93310BF7B765" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35943.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35943.json index 27133342e0f..b3d3dc97fff 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35943.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35943.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35943", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T19:15:11.153", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T18:47:03.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +66,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.23.0", + "versionEndExcluding": "1.23.12", + "matchCriteriaId": "588736F6-2FDC-4CF7-AFFA-7CFE16ED6EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.24.0", + "versionEndExcluding": "1.24.10", + "matchCriteriaId": "D8412E60-1C2F-4764-94F5-563FAA297466" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.25.9", + "matchCriteriaId": "0EC8FEB8-BB13-443C-8905-30B03F8F52E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.26.0", + "versionEndExcluding": "1.26.4", + "matchCriteriaId": "DA35F763-2810-4231-B5A9-93310BF7B765" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3782.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3782.json index 73bd2906b70..9a7df038160 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3782.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3782.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3782", "sourceIdentifier": "reefs@jfrog.com", "published": "2023-07-19T21:15:10.093", - "lastModified": "2023-07-28T14:57:03.743", + "lastModified": "2023-08-02T18:31:47.947", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:squareup:okhttp:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CBF8B08-42F4-4F30-9803-A93BD90A1646" + "criteria": "cpe:2.3:a:squareup:okhttp-brotli:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B91E4D25-67F7-43FA-82FE-72BA4DEB0FD4" } ] } diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38496.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38496.json index 62664c75ac5..df158c15ca1 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38496.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38496.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38496", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T22:15:10.503", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:32:49.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,18 +80,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:apptainer:1.2.0:-:*:*:*:go:*:*", + "matchCriteriaId": "7B4FFEA3-9FB9-4B9F-968E-E5C3282B6786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:apptainer:1.2.0:rc2:*:*:*:go:*:*", + "matchCriteriaId": "35B641D0-6C93-45F0-A297-1BBE3BF65DB6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/apptainer/apptainer/pull/1523", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/apptainer/apptainer/pull/1578", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38499.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38499.json index f558069a959..8c512263976 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38499.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38499.json @@ -2,16 +2,40 @@ "id": "CVE-2023-38499", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T21:15:10.997", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:11:12.320", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "TYPO3 is an open source PHP based web content management system. Starting in version 9.4.0 and prior to versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, and 12.4.4, in multi-site scenarios, enumerating the HTTP query parameters `id` and `L` allowed out-of-scope access to rendered content in the website frontend. For instance, this allowed visitors to access content of an internal site by adding handcrafted query parameters to the URL of a site that was publicly available. TYPO3 versions 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, 12.4.4 fix the problem." + }, + { + "lang": "es", + "value": "TYPO3 es un sistema de gesti\u00f3n de contenidos web de c\u00f3digo abierto basado en PHP. A partir de la versi\u00f3n 9.4.0 y antes de las versiones 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30, y 12.4.4 en escenarios multi-sitio, la enumeraci\u00f3n de los par\u00e1metros de consulta HTTP \"id\" y \"L\" permit\u00eda el acceso fuera del alcance al contenido renderizado en el frontend del sitio web. Por ejemplo, esto permit\u00eda a los visitantes acceder al contenido de un sitio interno a\u00f1adiendo par\u00e1metros de consulta manuales a la URL de un sitio que estaba disponible p\u00fablicamente. Las versiones de TYPO3 9.5.42 ELTS, 10.4.39 ELTS, 11.5.30 y 12.4.4 corrigen el problema. " } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +80,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndExcluding": "9.5.42", + "matchCriteriaId": "F977D03B-2605-4DDA-8E08-9E32862B36FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.4.39", + "matchCriteriaId": "4FD93DD8-F62F-4541-8B1E-0B78A069A9BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.5.30", + "matchCriteriaId": "6CA1BEF0-8CBD-46AE-A155-A010CCE92F6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.4.4", + "matchCriteriaId": "AE209B6F-686B-4896-A7E0-B8426A4818C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/TYPO3/typo3/commit/702e2debd4b28f9cdb540544565fe6a8627ccb6a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-jq6g-4v5m-wm9r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://typo3.org/security/advisory/typo3-core-sa-2023-003", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38500.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38500.json index 0ba4064f293..a88d80020dc 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38500.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38500.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38500", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T21:15:11.083", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:14:48.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +66,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "694BBC2E-09A9-4001-8B3E-DCDEEDDCA867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.1.2", + "matchCriteriaId": "75A963C2-ABB8-4AFC-A699-D47FEA291B67" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/TYPO3/html-sanitizer/commit/e3026f589fef0be8c3574ee3f0a0bfbe33d7ebdb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://typo3.org/security/advisory/typo3-core-sa-2023-002", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38501.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38501.json index 946747c439c..be96fbb66fb 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38501.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38501.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38501", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-25T22:15:10.600", - "lastModified": "2023-07-31T19:15:17.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:50:56.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +66,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.7", + "matchCriteriaId": "FA6436E9-0F22-49D5-B344-7EE9371CE469" + } + ] + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json index af0616a1bc6..e9895c6cefe 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json @@ -2,15 +2,41 @@ "id": "CVE-2023-3945", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-25T22:15:10.780", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:41:11.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in phpscriptpoint Lawyer 1.6. It has been classified as problematic. This affects an unknown part of the file search.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235401 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en phpscriptpoint Lawyer v1.6. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo \"search.php\". La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). Es posible iniciar el ataque de forma remota. Se ha asignado a esta vulnerabilidad el identificador VDB-235401. NOTA: Se contact\u00f3 con el proveedor con antelaci\u00f3n acerca de esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera. " } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +97,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpscriptpoint:lawyer:1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0213AC35-35CE-4443-8FF6-517BAF3ECDD1" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.235401", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.235401", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3947.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3947.json index 20cb9dd864f..a1b4eca02c8 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3947.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3947.json @@ -2,19 +2,43 @@ "id": "CVE-2023-3947", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-26T04:15:11.117", - "lastModified": "2023-07-26T04:24:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-02T19:37:12.583", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Video Conferencing with Zoom plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'vczapi_encrypt_decrypt' function in versions up to, and including, 4.2.1. This makes it possible for unauthenticated attackers to decrypt and view the meeting id and password." + }, + { + "lang": "es", + "value": "El plugin Video Conferencing with Zoom para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible debido a que la clave de cifrado est\u00e1 codificada en la funci\u00f3n \"vczapi_encrypt_decrypt\" en versiones hasta la v4.2.1 inclusive. Esto permite a atacantes no autenticados descifrar y ver el identificador y la contrase\u00f1a de la reuni\u00f3n. " } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -46,18 +70,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imdpen:video_conferencing_with_zoom:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.2.1", + "matchCriteriaId": "D7239604-04BC-4501-859B-DA6ADAC38F57" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/video-conferencing-with-zoom-api/tags/4.2.1/includes/helpers.php#L546", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/video-conferencing-with-zoom-api/trunk/includes/Helpers/Encryption.php?rev=2942302", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba2515d9-ced0-4b49-87c4-04c8391c2608?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 8c176b9c278..f859ba0e3f4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-02T18:00:37.396292+00:00 +2023-08-02T20:00:31.057053+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-02T18:00:10.260000+00:00 +2023-08-02T19:50:56.147000+00:00 ``` ### Last Data Feed Release @@ -34,46 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `0` -* [CVE-2023-36494](CVE-2023/CVE-2023-364xx/CVE-2023-36494.json) (`2023-08-02T16:15:10.207`) -* [CVE-2023-36858](CVE-2023/CVE-2023-368xx/CVE-2023-36858.json) (`2023-08-02T16:15:10.337`) -* [CVE-2023-38138](CVE-2023/CVE-2023-381xx/CVE-2023-38138.json) (`2023-08-02T16:15:10.440`) -* [CVE-2023-38418](CVE-2023/CVE-2023-384xx/CVE-2023-38418.json) (`2023-08-02T16:15:10.533`) -* [CVE-2023-38419](CVE-2023/CVE-2023-384xx/CVE-2023-38419.json) (`2023-08-02T16:15:10.633`) -* [CVE-2023-38423](CVE-2023/CVE-2023-384xx/CVE-2023-38423.json) (`2023-08-02T16:15:10.730`) -* [CVE-2023-3470](CVE-2023/CVE-2023-34xx/CVE-2023-3470.json) (`2023-08-02T16:15:10.837`) ### CVEs modified in the last Commit -Recently modified CVEs: `134` +Recently modified CVEs: `40` -* [CVE-2023-0045](CVE-2023/CVE-2023-00xx/CVE-2023-0045.json) (`2023-08-02T17:12:50.860`) -* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-08-02T17:15:09.650`) -* [CVE-2023-2156](CVE-2023/CVE-2023-21xx/CVE-2023-2156.json) (`2023-08-02T17:15:10.337`) -* [CVE-2023-31248](CVE-2023/CVE-2023-312xx/CVE-2023-31248.json) (`2023-08-02T17:15:10.493`) -* [CVE-2023-34644](CVE-2023/CVE-2023-346xx/CVE-2023-34644.json) (`2023-08-02T17:15:10.937`) -* [CVE-2023-35001](CVE-2023/CVE-2023-350xx/CVE-2023-35001.json) (`2023-08-02T17:15:11.260`) -* [CVE-2023-3390](CVE-2023/CVE-2023-33xx/CVE-2023-3390.json) (`2023-08-02T17:15:11.497`) -* [CVE-2023-3610](CVE-2023/CVE-2023-36xx/CVE-2023-3610.json) (`2023-08-02T17:15:11.637`) -* [CVE-2023-23540](CVE-2023/CVE-2023-235xx/CVE-2023-23540.json) (`2023-08-02T17:15:20.457`) -* [CVE-2023-1890](CVE-2023/CVE-2023-18xx/CVE-2023-1890.json) (`2023-08-02T17:15:26.853`) -* [CVE-2023-2712](CVE-2023/CVE-2023-27xx/CVE-2023-2712.json) (`2023-08-02T17:15:36.950`) -* [CVE-2023-2713](CVE-2023/CVE-2023-27xx/CVE-2023-2713.json) (`2023-08-02T17:15:42.557`) -* [CVE-2023-2703](CVE-2023/CVE-2023-27xx/CVE-2023-2703.json) (`2023-08-02T17:15:46.487`) -* [CVE-2023-2882](CVE-2023/CVE-2023-28xx/CVE-2023-2882.json) (`2023-08-02T17:15:51.977`) -* [CVE-2023-2884](CVE-2023/CVE-2023-28xx/CVE-2023-2884.json) (`2023-08-02T17:15:56.023`) -* [CVE-2023-2885](CVE-2023/CVE-2023-28xx/CVE-2023-2885.json) (`2023-08-02T17:15:59.467`) -* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-08-02T17:16:08.137`) -* [CVE-2023-2887](CVE-2023/CVE-2023-28xx/CVE-2023-2887.json) (`2023-08-02T17:16:19.853`) -* [CVE-2023-1055](CVE-2023/CVE-2023-10xx/CVE-2023-1055.json) (`2023-08-02T17:18:58.570`) -* [CVE-2023-21719](CVE-2023/CVE-2023-217xx/CVE-2023-21719.json) (`2023-08-02T17:19:09.020`) -* [CVE-2023-28261](CVE-2023/CVE-2023-282xx/CVE-2023-28261.json) (`2023-08-02T17:30:14.810`) -* [CVE-2023-28288](CVE-2023/CVE-2023-282xx/CVE-2023-28288.json) (`2023-08-02T17:30:22.453`) -* [CVE-2023-29344](CVE-2023/CVE-2023-293xx/CVE-2023-29344.json) (`2023-08-02T17:30:27.893`) -* [CVE-2023-33140](CVE-2023/CVE-2023-331xx/CVE-2023-33140.json) (`2023-08-02T17:30:35.767`) -* [CVE-2023-3696](CVE-2023/CVE-2023-36xx/CVE-2023-3696.json) (`2023-08-02T17:30:54.240`) +* [CVE-2014-4872](CVE-2014/CVE-2014-48xx/CVE-2014-4872.json) (`2023-08-02T19:00:25.903`) +* [CVE-2014-8270](CVE-2014/CVE-2014-82xx/CVE-2014-8270.json) (`2023-08-02T19:00:29.757`) +* [CVE-2021-39820](CVE-2021/CVE-2021-398xx/CVE-2021-39820.json) (`2023-08-02T18:32:39.680`) +* [CVE-2022-4909](CVE-2022/CVE-2022-49xx/CVE-2022-4909.json) (`2023-08-02T18:25:50.143`) +* [CVE-2022-24767](CVE-2022/CVE-2022-247xx/CVE-2022-24767.json) (`2023-08-02T19:28:28.173`) +* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-08-02T18:15:09.977`) +* [CVE-2023-3782](CVE-2023/CVE-2023-37xx/CVE-2023-3782.json) (`2023-08-02T18:31:47.947`) +* [CVE-2023-35941](CVE-2023/CVE-2023-359xx/CVE-2023-35941.json) (`2023-08-02T18:34:33.230`) +* [CVE-2023-35942](CVE-2023/CVE-2023-359xx/CVE-2023-35942.json) (`2023-08-02T18:36:02.047`) +* [CVE-2023-21405](CVE-2023/CVE-2023-214xx/CVE-2023-21405.json) (`2023-08-02T18:43:09.213`) +* [CVE-2023-35943](CVE-2023/CVE-2023-359xx/CVE-2023-35943.json) (`2023-08-02T18:47:03.400`) +* [CVE-2023-34189](CVE-2023/CVE-2023-341xx/CVE-2023-34189.json) (`2023-08-02T18:51:03.527`) +* [CVE-2023-35929](CVE-2023/CVE-2023-359xx/CVE-2023-35929.json) (`2023-08-02T18:54:38.123`) +* [CVE-2023-34235](CVE-2023/CVE-2023-342xx/CVE-2023-34235.json) (`2023-08-02T19:02:29.150`) +* [CVE-2023-38499](CVE-2023/CVE-2023-384xx/CVE-2023-38499.json) (`2023-08-02T19:11:12.320`) +* [CVE-2023-32232](CVE-2023/CVE-2023-322xx/CVE-2023-32232.json) (`2023-08-02T19:12:35.040`) +* [CVE-2023-38500](CVE-2023/CVE-2023-385xx/CVE-2023-38500.json) (`2023-08-02T19:14:48.317`) +* [CVE-2023-32231](CVE-2023/CVE-2023-322xx/CVE-2023-32231.json) (`2023-08-02T19:17:06.810`) +* [CVE-2023-3384](CVE-2023/CVE-2023-33xx/CVE-2023-3384.json) (`2023-08-02T19:17:31.647`) +* [CVE-2023-22743](CVE-2023/CVE-2023-227xx/CVE-2023-22743.json) (`2023-08-02T19:27:45.450`) +* [CVE-2023-1522](CVE-2023/CVE-2023-15xx/CVE-2023-1522.json) (`2023-08-02T19:32:36.860`) +* [CVE-2023-38496](CVE-2023/CVE-2023-384xx/CVE-2023-38496.json) (`2023-08-02T19:32:49.440`) +* [CVE-2023-3947](CVE-2023/CVE-2023-39xx/CVE-2023-3947.json) (`2023-08-02T19:37:12.583`) +* [CVE-2023-3945](CVE-2023/CVE-2023-39xx/CVE-2023-3945.json) (`2023-08-02T19:41:11.373`) +* [CVE-2023-38501](CVE-2023/CVE-2023-385xx/CVE-2023-38501.json) (`2023-08-02T19:50:56.147`) ## Download and Usage