Auto-Update: 2024-02-15T23:00:24.830948+00:00

This commit is contained in:
cad-safe-bot 2024-02-15 23:00:28 +00:00
parent 0cd31d6ab1
commit cc9d1b42d5
55 changed files with 2818 additions and 2972 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-0609",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-08-02T04:00:00.000",
"lastModified": "2017-12-19T02:29:23.910",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:29:32.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -61,21 +83,6 @@
"criteria": "cpe:2.3:a:infodrom:cfingerd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.3",
"matchCriteriaId": "1B8A7F9D-F2A9-4B7A-BDEA-CADC7A21421A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infodrom:cfingerd:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2DDB49-F05D-4698-A29C-B9121D7C8B09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infodrom:cfingerd:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9E8C3B-C2D0-4242-AC80-6EB1A4ABBBCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:infodrom:cfingerd:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6DB288-F853-4014-A3E7-751EBE34536E"
}
]
}
@ -87,6 +94,7 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0202.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Vendor Advisory"
@ -96,14 +104,21 @@
"url": "http://www.securityfocus.com/bid/2576",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6364",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-1471",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-07-31T04:00:00.000",
"lastModified": "2017-07-11T01:29:09.023",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:06:58.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-665"
}
]
}
@ -58,23 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E15A5879-39FE-4BFF-B391-52EAA58D1A0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "581594BF-92CE-4B16-95DC-200E11C64591"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AEBFC1B3-8C7D-4B63-8E92-F1759EACA2BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3575646-AF8E-4D33-97DE-E6EA468D9973"
"criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.0",
"matchCriteriaId": "4176B2DC-A6FF-4A1C-ADC4-39F1D403FD73"
}
]
}
@ -84,11 +92,17 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/920931",
@ -102,13 +116,20 @@
"url": "http://www.securityfocus.com/bid/3167",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch"
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-1721",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2017-07-11T01:29:22.227",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:13:18.603",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -58,13 +80,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:altermime:0.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CF724DEE-61A0-4CC9-9268-14E94E732ED7"
"criteria": "cpe:2.3:a:pldaniels:altermime:0.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1F797EB1-B648-4D82-BBC7-2972A931FC88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:paul_l_daniels:altermime:0.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F6F29C-DBCE-4223-ACC2-B5B1D4622AF2"
"criteria": "cpe:2.3:a:pldaniels:altermime:0.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C8444C-AF8C-4AEF-9069-98FBE44F5851"
}
]
}
@ -74,18 +96,28 @@
"references": [
{
"url": "http://www.pldaniels.com/altermime/CHANGELOG",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "http://www.securityfocus.com/bid/4650",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8992",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-1745",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2018-10-30T16:25:10.357",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:28:24.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -67,13 +89,31 @@
}
],
"references": [
{
"url": "http://online.securityfocus.com/archive/1/268303",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/4543",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8853",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2002-1816",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2008-09-05T20:31:35.527",
"lastModified": "2024-02-15T21:28:07.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -58,13 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yann_ramin:atphttpd:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "25F3EB3D-6568-4C76-BF12-0D67FF0E7B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yann_ramin:atphttpd:0.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "A912DFC5-5D7B-4377-8E2E-A95664CFAAC6"
"criteria": "cpe:2.3:a:redshift:atphttpd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.4b",
"matchCriteriaId": "0C118822-3AD5-4E3A-980A-22CC449FA562"
}
]
}
@ -76,20 +94,35 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/7293",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/10362.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/5956",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch"
"Patch",
"Third Party Advisory",
"VDB Entry"
]
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2002-1820",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2008-09-05T20:31:36.120",
"lastModified": "2024-02-15T21:19:31.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -58,13 +80,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63D4AA57-F9FD-423D-8AE9-A6606009152E"
"criteria": "cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "6644F071-4F2F-4021-BAF2-B5DC3BA2E264"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.0_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "122A4771-B26A-457C-8E97-47BA813E74B6"
"criteria": "cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "0BBCBEC8-C540-49DB-AAF6-84A8AAB8B588"
}
]
}
@ -76,12 +98,27 @@
"url": "http://www.iss.net/security_center/static/9972.php",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/archive/1/289417",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/5580",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2003-0625",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-08-27T04:00:00.000",
"lastModified": "2016-10-18T02:36:02.540",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:12:33.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -62,13 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xfstt:xfstt:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DA10E638-750B-477A-8F56-006D7030C0CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xfstt:xfstt:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB6FF4A-D43A-45C4-898E-AB3C53A09A33"
"criteria": "cpe:2.3:a:hadrons:xfstt:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.1",
"matchCriteriaId": "E96C5BBF-1169-4481-A763-7A24D962C830"
}
]
}
@ -78,16 +96,24 @@
"references": [
{
"url": "http://developer.berlios.de/forum/forum.php?forum_id=2819",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=105941103709264&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://www.debian.org/security/2003/dsa-360",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -96,7 +122,10 @@
"url": "http://www.securityfocus.com/bid/8255",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2003-0813",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-11-17T05:00:00.000",
"lastModified": "2019-04-30T14:27:13.913",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:19:53.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-367"
}
]
}
@ -60,16 +60,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
@ -87,223 +77,38 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"matchCriteriaId": "E69D0E21-8C62-403E-8097-2CA403CBBB1B"
"criteria": "cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40FC681A-7B85-4495-8DCC-C459FE7E2F13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"matchCriteriaId": "B127407D-AE50-4AFE-A780-D85B5AF44A2D"
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:*:*",
"matchCriteriaId": "DB28B8C1-9110-4780-A0CB-2188D1E86F56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"matchCriteriaId": "5D42E51C-740A-4441-8BAF-D073111B984C"
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:*:*",
"matchCriteriaId": "8C5AA872-3652-4A44-8858-80F7E73AE610"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"matchCriteriaId": "34ACB544-87DD-4D9A-99F0-A10F48C1EE05"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "D7FF4488-E42E-4895-8C25-D71E3969BF3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"matchCriteriaId": "74AD256D-4BCE-41FB-AD73-C5C63A59A06D"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "D70FFD93-4E29-4CBF-A6FF-08AF64757B99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"matchCriteriaId": "B518E945-5FDE-4A37-878D-6946653C91F7"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "237D7C18-C8D6-4FDB-A160-FA17DD46A55A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"matchCriteriaId": "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
"matchCriteriaId": "35346A7B-2CB5-446D-B0C3-1F21D71A746D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "064F4E76-1B89-4FA5-97ED-64624285C014"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"matchCriteriaId": "089A953C-8446-4E6F-B506-430C38DF37B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
"matchCriteriaId": "416F06DD-980E-4A54-822D-CBA499FD1F86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "F66DC6FF-2B3D-4718-838F-9E055E89961F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"matchCriteriaId": "656AE014-AEEC-46E8-A696-61FEA7932F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
"matchCriteriaId": "A08D0EA1-DA1B-4C52-883A-3F156F032517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "DA267420-56C5-4697-B0AA-52932F78B24B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"matchCriteriaId": "93BA426E-DD51-44AC-BE78-3164670FF9E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
"matchCriteriaId": "02BE9817-E1AE-4619-8302-CA7AA4167F48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "363E3895-A19B-42EC-B479-765168DC0B17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"matchCriteriaId": "FBBBF25A-709B-4716-9894-AD82180091AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
"matchCriteriaId": "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "81B7961D-151D-4773-80CB-CCD0456BFEAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"matchCriteriaId": "82781A72-A34F-4668-9EE8-C203B04E3367"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
"matchCriteriaId": "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "B5CAF64E-98AA-4813-A2A2-5AC3387CF230"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"matchCriteriaId": "BCDFDBBA-6C4F-472A-9F4F-461C424794E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
"matchCriteriaId": "EDDD8DA8-D074-4543-AEDF-F856B5567F21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
"matchCriteriaId": "CA7BA525-6DB8-4444-934A-932AFED69816"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
"matchCriteriaId": "90CFA69B-7814-4F97-A14D-D76310065CF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
"matchCriteriaId": "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*",
"matchCriteriaId": "B95B2BE4-B4E0-4B77-9999-53B9224F5CB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"matchCriteriaId": "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*",
"matchCriteriaId": "ADEBB882-1C55-4B7B-B4CF-F1B23502FD90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2572F7E5-75A3-4C11-866B-A4E9ADBD8D08"
}
]
}
@ -313,27 +118,45 @@
"references": [
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
]
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
]
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"URL Repurposed"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=106579825211708&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=106588827513795&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=ntbugtraq&m=106580303918155&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/547820",
@ -346,16 +169,26 @@
},
{
"url": "http://www.securityfocus.com/bid/8811",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitylab.ru/_exploits/rpc2.c.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA04-104A.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
@ -363,25 +196,39 @@
"url": "http://xforce.iss.net/xforce/alerts/id/155",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A893",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A894",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A900",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-0119",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-06-01T04:00:00.000",
"lastModified": "2020-11-13T16:32:04.430",
"lastModified": "2024-02-15T21:44:29.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -108,6 +130,7 @@
"url": "http://www.securityfocus.com/bid/10113",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -116,6 +139,7 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA04-104A.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
@ -140,6 +164,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1808",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -147,6 +172,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1962",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -154,6 +180,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1997",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0184",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-05-04T04:00:00.000",
"lastModified": "2017-10-11T01:29:22.857",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:09:24.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,11 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-191"
}
]
}
@ -62,9 +66,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8.1",
"matchCriteriaId": "F64FF8C5-C68F-4AD2-A370-1ACE4997AB3B"
"matchCriteriaId": "770A6EDA-10B7-4DB1-B150-A40F015FE3FB"
}
]
}
@ -74,16 +78,33 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=108067265931525&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/11258",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1009593",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.debian.org/security/2004/dsa-478",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -92,6 +113,7 @@
"url": "http://www.kb.cert.org/vuls/id/492558",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
@ -99,41 +121,70 @@
"url": "http://www.rapid7.com/advisories/R7-0017.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-219.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/10004",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.tcpdump.org/tcpdump-changes.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "http://www.trustix.org/errata/2004/0015",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=1468",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15679",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9581",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A976",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0221",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-05-04T04:00:00.000",
"lastModified": "2017-07-11T01:29:59.010",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:09:30.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-125"
}
]
}
@ -74,12 +74,17 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=108008530028019&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/524497",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
@ -87,24 +92,42 @@
"url": "http://www.openbsd.org/errata.html",
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
]
},
{
"url": "http://www.rapid7.com/advisories/R7-0018.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/9907",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/alerts/2004/Mar/1009468.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15630",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0389",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-06-01T04:00:00.000",
"lastModified": "2017-07-11T01:30:07.497",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:42:34.903",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-476"
}
]
}
@ -72,10 +94,19 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/11395",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=102&type=vulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Vendor Advisory"
@ -85,12 +116,19 @@
"url": "http://www.securityfocus.com/bid/10157",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15880",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0594",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-07-27T04:00:00.000",
"lastModified": "2018-10-30T16:25:35.387",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:17:59.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-367"
}
]
}
@ -60,6 +60,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "48A4B336-2D5B-4D9B-AA87-E5266FED05BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37042CDE-E4FE-442E-891A-CD84433D36E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
@ -67,13 +77,28 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F"
"criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6996B14-925B-46B8-982F-3545328B506B"
"criteria": "cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "54C09E05-4FAA-4893-BF36-9DD967525C4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "972D4ABF-2E80-4902-910D-5BD0CBEC9765"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7425AE-26A6-48A4-B883-C6220FCAC32B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*",
"matchCriteriaId": "12C73959-3E02-4847-8962-651D652800EE"
},
{
"vulnerable": true,
@ -102,293 +127,40 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D12D6986-429E-4152-A6E5-4CC1FB9556D3"
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndExcluding": "4.3.7",
"matchCriteriaId": "04AA8CFD-CEAD-455C-A96A-E1FE87196C86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "245C601D-0FE7-47E3-8304-6FF45E9567D6"
"criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "691BB8BB-329A-4640-B758-7590C99B5E42"
"criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BC4CCE-2774-463E-82EA-36CD442D3A7B"
"criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C478024C-2FCD-463F-A75E-E04660AA9DF1"
"criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F"
"criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1851ADE5-C70C-46E0-941A-6ADF7DB5C126"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "69DA3BA2-AF53-4C9D-93FA-0317841595B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "67B59D6A-7EDA-4C34-81D6-C2557C85D164"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AEBA40B6-8FDF-41AA-8166-F491FF7F3118"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E74E2B72-A428-4BB3-B6F8-0AF5E487A807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "945FF149-3446-4905-BCA1-C397E3497B58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "8E446DBD-FEFA-4D22-9C9D-51F61C01E414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "3C8DE728-78E1-4F9F-BC56-CD9B10E61287"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "80E31CC6-9356-4BB7-9F49-320AAF341E1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3E7199-8FB7-4930-9C0A-A36A698940B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDBEC461-D553-41B7-8D85-20B6A933C21C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78BAA18C-E5A0-4210-B64B-709BBFF31EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"matchCriteriaId": "419867C6-37BE-43B4-BFE0-6325FEE3807D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"matchCriteriaId": "37896E87-95C2-4039-8362-BC03B1C56706"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "13A159B4-B847-47DE-B7F8-89384E6C551B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "57B59616-A309-40B4-94B1-50A7BC00E35C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"matchCriteriaId": "8667FBC6-04B6-40E5-93B3-6C22BEED4B26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F39A1B1-416E-4436-8007-733B66904A14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FC2E5F96-66D2-4F99-A74D-6A2305EE218E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2D724D09-0D45-4701-93C9-348301217C8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "6E36203C-1392-49BB-AE7E-49626963D673"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6713614A-B14E-4A85-BF89-ED780068FC68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FD95F8EB-B428-4B3C-9254-A5DECE03A989"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "069EB7EE-06B9-454F-9007-8DE5DCA33C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"matchCriteriaId": "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "18BF5BE6-09EA-45AD-93BF-2BEF1742534E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1460DF-1687-4314-BF1A-01290B20302D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "470380B0-3982-48FC-871B-C8B43C81900D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAF4586-74FF-47C6-864B-656FDF3F33D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5652D5B0-68E4-4239-B9B7-599AFCF4C53E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "57B71BB7-5239-4860-9100-8CABC3992D8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E3797AB5-9E49-4251-A212-B6E5D9996764"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20C0BD87-CE4B-49D2-89BE-EF282C43AD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C3E6C4A8-59F4-43EE-8413-E95289037598"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE76357A-27E6-4D85-9AA0-1BB658C41568"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C56C5FDB-24E2-479D-87CA-164CD28567D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019"
"criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4"
}
]
}
@ -398,79 +170,140 @@
"references": [
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"URL Repurposed"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108981780109154&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108982983426031&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=109051444105182&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=109181600614477&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2004/dsa-531",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-669",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-392.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-395.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-405.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-816.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/10725",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.trustix.org/errata/2004/0039/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-2154",
"sourceIdentifier": "secalert@redhat.com",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2017-10-11T01:29:46.857",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:17:54.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -58,103 +80,29 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "68BD578F-CCAD-4515-9205-EB4F297C6DB4"
"criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.21",
"matchCriteriaId": "5F835149-D8DC-4086-8A1A-6DA6F0B1641F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
"matchCriteriaId": "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3"
},
"criteria": "cpe:2.3:a:apple:cups:1.1.21:-:*:*:*:*:*:*",
"matchCriteriaId": "1AE87AA4-1F4C-46CC-8365-6390B5E9C2D7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "734D0C2C-F71F-461A-87EE-202C6B706753"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0F402D-5CD0-4477-8B59-C753CECB02BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
"matchCriteriaId": "959F7AFA-ED20-434C-993F-06C2A8574662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
"matchCriteriaId": "D4F5A0A4-2884-46CA-A846-8B954EB80CFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "35E65857-12C7-49DE-AD27-3CACD456231C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "47CEF035-57A6-470B-916A-E5562C28E866"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4E26BB15-4CF8-4496-A7F7-EB34C444EF72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D414984E-4F6B-4278-8346-968587E4B18E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "33C36DCB-2FDD-44E6-85E8-875575AAE69E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7C4B7C23-0C54-4FBA-A774-9CC1E148376E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A786A770-919E-4E23-949D-D836F316618A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "00A2249C-73DE-434E-A41F-4EDB0ADC0845"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "FB7653F1-70E2-423F-A6A9-30333644B506"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "778A6957-455B-420A-BAAF-E7F88FF4FB1E"
}
]
}
@ -166,35 +114,52 @@
"url": "http://www.cups.org/str.php?L700",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-571.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-185-1",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162405",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163274",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9940",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2006-4095",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-06T00:04:00.000",
"lastModified": "2018-10-17T21:33:21.160",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:04:44.160",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -22,6 +22,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -55,7 +77,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-617"
}
]
}
@ -69,43 +91,77 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F"
"criteria": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.2.6",
"matchCriteriaId": "862B3924-FB12-4851-A647-74F563ED2DA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D43375C5-0736-43DE-99B5-B75719D0AD0F"
"criteria": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndIncluding": "9.3.2",
"matchCriteriaId": "E4696610-EF54-47D8-AC5E-D7251EA40DD5"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*",
"matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4360536-0BA6-41DB-AA87-45AFB51562CD"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0FA3A32E-445A-4D39-A8D5-75F5370AD23D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "438AEC8C-DD71-4A25-9E9D-A89415F7EC83"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "6CE37418-3D19-483A-9ADE-2E38272A4ACC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C"
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndExcluding": "10.4.9",
"matchCriteriaId": "C2B4D4BA-89EB-4D02-AC3E-D451CC45395F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "847C1017-F964-4A33-BEA8-DDB202DD0FB6"
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.3.9",
"matchCriteriaId": "3E9A9D63-EEA1-4289-8382-6CC91D2241A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "92F95086-3107-4C38-BB3B-7BABA9BD15C3"
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndExcluding": "10.4.9",
"matchCriteriaId": "AD69D222-8B01-4944-A459-D3FFDCA6BBC0"
}
]
}
@ -115,102 +171,258 @@
"references": [
{
"url": "http://docs.info.apple.com/article.html?artnum=305530",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/21752",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21786",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21816",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21818",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21828",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21835",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21838",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21912",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/21926",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22298",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/24950",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/25402",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200609-11.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1016794",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/915404",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:163",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_24_sr.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openbsd.org/errata.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/445600/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/19859",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-343-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.us.debian.org/security/2006/dsa-1172",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3473",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/1401",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/1939",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28745",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-626",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-4434",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-29T00:04:00.000",
"lastModified": "2011-03-10T05:00:00.000",
"lastModified": "2024-02-15T21:20:06.930",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -22,6 +22,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -55,7 +77,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-416"
}
]
}
@ -69,218 +91,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE4E6D5E-BD37-4F8E-962C-0438C62BEF72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:4.55:*:*:*:*:*:*:*",
"matchCriteriaId": "111C0FC5-A199-44CA-9512-9E6B12514E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*",
"matchCriteriaId": "5DFC5B8B-9102-46A9-9BD3-5CC0B671383F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*",
"matchCriteriaId": "51BC02ED-17B1-44B3-97DB-F626A2BD2524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*",
"matchCriteriaId": "EF58EBCB-5735-4569-957D-C37CC38F0823"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B754AD41-90A0-4382-B599-E41289C690A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
"matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
"matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
"matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
"matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
"matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7B82BBB7-CD72-4A33-97D4-B1E51A595323"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1D6A40-5DD1-481C-AF85-85705FCE3680"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DC7125C4-64AF-4A3B-BBD6-1A56660A2D90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "83AE5BA5-09FF-4AF8-B4E8-4D372A208E2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D20FAC60-445E-4847-B5DE-8ACDDA55E1CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9962F81C-A08C-4F8E-A07C-4F4B5C441EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A38C234D-EF75-4A96-A0FD-E1DDDADAC1BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED21E7-6DBC-4846-BF52-FE11A3D8A361"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:*",
"matchCriteriaId": "CD501A5A-E602-4847-8178-E9CC289AD41C"
"criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.13.8",
"matchCriteriaId": "59AD875A-87DA-43B2-87DB-DD7993118276"
}
]
}
@ -288,59 +101,144 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/21637",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21641",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21696",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21700",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21749",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/22369",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1016753",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-1164",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openbsd.org/errata.html#sendmail3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "http://www.openbsd.org/errata38.html#sendmail3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.osvdb.org/28193",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/19714",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.sendmail.org/releases/8.13.8.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Release Notes"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/3393",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -348,6 +246,7 @@
"url": "http://www.vupen.com/english/advisories/2006/3994",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2006-4574",
"sourceIdentifier": "secalert@redhat.com",
"published": "2006-10-28T00:07:00.000",
"lastModified": "2018-10-17T21:38:07.510",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:20:15.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,11 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
},
{
"lang": "en",
"value": "CWE-617"
}
]
}
@ -62,53 +88,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9053B950-143E-4941-9C58-A57D9F1FF78D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD279A0-5BA7-4D86-B975-2E76B4B2D85B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "41535173-00D3-4E52-9441-D7ED44BE9B05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "589FBD3D-FFE4-4BB3-B5F9-7FF949212AE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BD4F19A6-98D5-4B6A-8AF0-D88561D50296"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D5E65C-08BF-480D-A7BE-1876E9AC93E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "503E7F73-0E2A-442C-9B76-679A2AD03052"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C422E5-3252-48C2-B4FF-E32AA5463D97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "31C43A78-E578-4B1C-8E33-24529E973E30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A0D56DA6-3EB2-4074-8C43-A5FD93B1555B"
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.10.1",
"versionEndIncluding": "0.99.3",
"matchCriteriaId": "4D0290BD-E0AE-4DC5-BE29-D8B9A25309CB"
}
]
}
@ -118,59 +101,165 @@
"references": [
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22590",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/22659",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22672",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22692",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22797",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22841",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/22929",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/23096",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1017129",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:195",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_65_ethereal.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2006-0726.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/450307/100/0/threaded",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/20762",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us.debian.org/security/2006/dsa-1201",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/4220",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.wireshark.org/security/wnpa-sec-2006-03.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29844",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-746",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-5544",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-10-29T21:46:00.000",
"lastModified": "2011-03-08T03:00:53.407",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:33:30.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "CWE-732"
}
]
}
@ -62,33 +84,26 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C709D66D-3AE7-48B7-9E27-5D1FE452643C"
"criteria": "cpe:2.3:a:ibm:lotus_domino:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.5",
"matchCriteriaId": "ED2E3AB3-15AF-42F8-9AAC-8A7D3C553474"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:fp1:*:*:*:*:*",
"matchCriteriaId": "7B0B5F96-0762-45D3-B13E-1E4ED04AD69D"
"criteria": "cpe:2.3:a:ibm:lotus_domino:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.0.2",
"matchCriteriaId": "34C250E2-C8A3-4160-85E2-5DAFADFC2507"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:fp2:*:*:*:*:*",
"matchCriteriaId": "DB1EA406-6488-46C0-B857-0BFFAA65B258"
"criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "6ADFA292-0E8C-489E-9D97-99996D3EB626"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDDB5FD-9152-4A9C-829B-8BA2ACB3A5A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A7AF44-125F-4760-8370-34B7B4CB8753"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "69495B18-39A4-443F-A724-F713C4DD14A2"
"criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "EF980FE0-9048-4EB3-A520-462C9419EFF6"
},
{
"vulnerable": true,
@ -98,18 +113,10 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "957BA698-9D48-4906-9FF3-584927C978B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "94646433-DE15-4214-9C78-7D1DAB5A12D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3449A490-865A-4262-8482-429DEF455644"
"criteria": "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.3",
"matchCriteriaId": "A30DAD9B-D09E-4011-A7B2-8F1E401DFE5F"
}
]
}
@ -117,24 +124,45 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/27321",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257030",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/26146",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-013.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/3598",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-1073",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-03-31T18:24:45.953",
"lastModified": "2009-04-08T05:36:53.500",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:31:04.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "CWE-732"
}
]
}
@ -63,78 +85,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.6.7",
"matchCriteriaId": "DB943F53-F658-44C7-B873-B21129233271"
},
"versionEndExcluding": "0.6.8",
"matchCriteriaId": "C3B17F2C-7A87-4AFC-AA24-5D2F2B4C787F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9D924092-07D7-4C20-A796-3CB3188B2F0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B7147BE-A2F9-4624-AF69-75418C10EB9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "355A69B0-3A7C-41FD-BD83-7D4A038EA604"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B31273EF-3D69-404B-86A6-766235EFBEA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D6525-A15C-4269-BAB3-9D0CF5B71F23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "46B21B17-2CE8-45D6-8E87-8DAF87F4A72E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9FBE5B-A552-498F-A7A9-75E921251F69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "45FF80F0-B083-44E5-AE45-286F8A72FF97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C4FD7D7-4033-4EDF-AF0C-DCE5489DE8AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE2FBA0-6E94-4D8A-80E0-5D195622E69F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "424198C2-8CE1-4A38-91E7-75347F1EC258"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "036082D2-A5D1-4B64-BA1F-D4ECB82AC472"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EC31E2-720E-4C38-AB4C-D5AB87EA9734"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:debian:nss-ldap:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD88B40-E630-4D0E-A9CF-3DFCEAB09D03"
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
}
]
}
@ -146,54 +113,90 @@
"url": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://launchpad.net/bugs/cve/2009-1073",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/34523",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1758",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Patch",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/03/23/3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/03/24/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/03/25/3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/03/25/4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.securityfocus.com/bid/34211",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-2054",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2009-08-27T17:00:01.047",
"lastModified": "2009-09-02T05:23:46.967",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:15:40.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-770"
}
]
}
@ -62,513 +62,31 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:business:*:*:*:*:*",
"matchCriteriaId": "0B9151D5-00FC-4E8D-B5E8-6A5B8599FF3B"
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndExcluding": "5.1\\(3g\\)",
"matchCriteriaId": "4C7C8DA6-9BAD-4ECB-8901-F1527C8710D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "79A1DD14-FB18-468B-948E-107CAEA4EBEB"
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1\\(4\\)",
"matchCriteriaId": "8E11B055-9625-4A00-8252-6E1660037F12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E34261EC-F5DD-4AE3-BFED-CCD6DBE63E12"
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.0\\(2a\\)su1",
"matchCriteriaId": "906EED24-1D35-4952-AFCA-D7D5223F66D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5445967-D487-4B66-9DCA-E42277E8284A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B9DA1F8-FA05-4380-8EFF-AF9FEF18FF2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "65BB9155-89E5-4D54-AF1B-D5CA38392D5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*",
"matchCriteriaId": "2A76CD6B-0C24-4F5F-B4BB-BA114150A7F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E29A61E-334B-4F95-9B47-8F53A4DB3EB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr.5:*:*:*:*:*:*",
"matchCriteriaId": "FBE07ABF-97B2-48B4-8EF6-861AB41340F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr4:*:*:*:*:*:*",
"matchCriteriaId": "9135D3DE-5110-47CB-A23F-7CE3D9AFD153"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5:*:*:*:*:*:*",
"matchCriteriaId": "914A2B2A-6292-451B-B26A-1B529CECBE3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5b:*:*:*:*:*:*",
"matchCriteriaId": "72FAE8F7-504A-4B6F-9C9D-45158AC6C208"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5c:*:*:*:*:*:*",
"matchCriteriaId": "835DD627-C5F1-4733-8949-C91592EC719A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFD96E3-B19F-41B7-86FD-DBFD41382C28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9BF838-87A2-43B8-975B-524D7F954BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
"matchCriteriaId": "9600EA23-5428-4312-A38E-480E3C3228BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
"matchCriteriaId": "57F5547E-F9C8-4F9C-96A1-563A66EE8D48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0467A78A-8449-4012-BD80-86BAF8376B8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "363E750B-4BC1-4A4B-8440-1617BEF9D8A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B44AB103-60E6-4FAF-BD7C-54365E30C88A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2\\(3\\)sr.2:*:*:*:*:*:*",
"matchCriteriaId": "701A374B-00A7-4151-8652-9A39FAECBC5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr2b:*:*:*:*:*:*",
"matchCriteriaId": "42F41FF1-3FD1-4E90-877C-AC10D56CFEA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr3:*:*:*:*:*:*",
"matchCriteriaId": "291CFDEC-CDF8-438D-9D1E-2832CE705FB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9DCB59-F6AD-4CBD-B746-8FBA4BF733CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr2b:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E094AB-5F10-4238-BBE3-236B7306C995"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr3:*:*:*:*:*:*:*",
"matchCriteriaId": "2496F01D-E387-48CD-B586-826D284BBC2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr4:*:*:*:*:*:*:*",
"matchCriteriaId": "B5955E35-E200-4054-8757-39BD04F13220"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC830649-C0D4-4FFC-8701-80FB4A706F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "935D2815-7146-4125-BDBE-BFAA62A88EC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3_sr3:*:*:*:*:*:*:*",
"matchCriteriaId": "55FCD7DD-A979-4B35-8C9C-5DAA340D2AEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "19432E5E-EA68-4B7A-8B99-DEBACBC3F160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4CD8E-F27C-4F96-B955-FC1E71B5D55B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_1:*:*:*:*:*:*:*",
"matchCriteriaId": "E837527C-D5FA-479F-A61B-8667972FC594"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_2:*:*:*:*:*:*:*",
"matchCriteriaId": "488023AF-EA56-40E2-9A23-61EA758180D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E1D151-8031-447A-9CB9-871599404339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3_sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED2283C-822A-45B1-B82B-90EEB78CD372"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3_sr2b:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A6AC6B-D3CD-4F05-A73F-61041C6DB514"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3_sr3:*:*:*:*:*:*:*",
"matchCriteriaId": "939CD685-4539-421F-BC12-36E641301E8D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C48DC30-8F7D-4448-9C42-3CBC25053C99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:4.3\\(1\\)sr.1:*:*:*:*:*:*",
"matchCriteriaId": "25EF5BF5-5909-4194-96DD-E8725BD3499A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F1DEC3B-2782-4144-9651-73116294765D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\)sr.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A459F3A2-817B-4F7F-AF9B-4EACB90B7DF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0BB09252-6C59-4E1C-93C8-0AC3ED54A294"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA0F270A-F953-43C7-9358-3B237B355BB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DCCDC7F-5326-4B6B-9B6F-DAD43E51CD76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6E4272-6FDA-4C49-8F4A-C234041C0DD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3_1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F524EFB-C076-4EA2-8BF7-9A1B21036CBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3_1_sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "97DC0190-A028-489D-BF61-8A49A91C15B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AF68FA-433F-46F2-B309-B60A108BECFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE62DB5-943D-43B5-BD13-D74DAA122578"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_2:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D76BC6-1A59-4D74-A7C9-8C05D96E01F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_3:*:*:*:*:*:*:*",
"matchCriteriaId": "788BDB54-0970-468F-9713-14B097E1A863"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_3a:*:*:*:*:*:*:*",
"matchCriteriaId": "3CAE1371-F46C-4DFD-A4A4-D609E93C4740"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7AC2F39-C029-4FAB-A963-0C7F1D5A8067"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4a:*:*:*:*:*:*:*",
"matchCriteriaId": "62781360-15FC-4E40-AEF8-BF01606A671B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4a_su1:*:*:*:*:*:*:*",
"matchCriteriaId": "08E03DCC-4DCB-4830-943F-05F7E3BB49EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "640BFEE2-B364-411E-B641-7471B88ED7CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(1\\):*:*:*:*:*:*",
"matchCriteriaId": "B860F1E1-E295-4B71-B396-14286611EA36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2\\):*:*:*:*:*:*",
"matchCriteriaId": "E194E6EC-282D-4C8E-96E3-00D64FCD8C6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2a\\):*:*:*:*:*:*",
"matchCriteriaId": "5B2EA451-EE18-440A-924A-556A2EC74300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2b\\):*:*:*:*:*:*",
"matchCriteriaId": "8950C510-38F3-4040-8871-C085DDECF5B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(3a\\):*:*:*:*:*:*",
"matchCriteriaId": "7101A008-3F3C-4ABB-B4FC-25BDA8809C87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:5.1\\(1\\):*:*:*:*:*:*",
"matchCriteriaId": "CDEF7B2B-66CB-4C92-B678-859693C8C890"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:5.1_\\(2a\\):*:*:*:*:*:*",
"matchCriteriaId": "8AA0378D-5EE0-4BD6-BB33-7DF01F830DDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1B9FDFF3-2E60-4E41-9251-93283D945D94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "239510AD-8BB0-4515-B1DA-80DE696D25DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "26277C4A-4E27-492C-B18C-AC68D86ADF55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9003EC1A-6E85-41F1-BB5D-B841C9C28105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0318CF61-B892-4D44-B41A-D630B4AB808C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9CDA8A78-BA6C-4451-8EAA-B83C3A6C6BA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "84A49932-1E22-4BE0-8195-926D44F65AAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4DE1B0DD-EA64-493B-86B7-9057EE5033C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E51D8BF-12BB-4DD1-9232-1D066889B30F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AD2935E2-7340-4B49-8B5D-C7801FD605C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_1:*:*:*:*:*:*:*",
"matchCriteriaId": "2740B5E5-E8D2-491E-B174-A1A9DF812418"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_2:*:*:*:*:*:*:*",
"matchCriteriaId": "60D93DAA-0ED6-4DA5-B7A5-50D5567A6178"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_2a:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA1ABD3-D076-4CA6-A12D-3C3BB5080B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_2b:*:*:*:*:*:*:*",
"matchCriteriaId": "54B14EC5-4391-4698-BF6F-2726FD28D318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_3a:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F1270F-DBF6-4938-A1A0-732EE52C83E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:\\(1\\):*:*:*:*:*:*",
"matchCriteriaId": "156F822A-08CB-4EE2-9054-18F649D96C39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:\\(1a\\):*:*:*:*:*:*",
"matchCriteriaId": "53CBD1E5-46C6-4F31-867A-118227EB0473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2DF1139-A161-48DD-9929-F6939D626461"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF99088E-1330-4E15-8BD3-2A5172FBA460"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0_1:*:*:*:*:*:*:*",
"matchCriteriaId": "05F443F9-B454-42B3-8464-ACEA40066DF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0_1a:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBF1FDC-7096-4EE6-B9A2-0C9971F407D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC6EF34-D23D-45CA-A907-A47993CC061E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:\\(1a\\):*:*:*:*:*:*",
"matchCriteriaId": "8E8F77F9-05C3-4B66-9022-7B227F97978C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2B7439-8547-41A6-AE6C-6ABCD167890E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "42F3870B-5DE9-4E3E-BEA7-863916DD45DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1_1a:*:*:*:*:*:*:*",
"matchCriteriaId": "047E45A0-C0F0-4900-B5FB-8F0A5852732D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2564A8-5805-46E0-B6EC-F4967D67C566"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0907FAF-8334-42C1-B35A-EC6ED89AC110"
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1",
"versionEndExcluding": "7.1\\(2a\\)su1",
"matchCriteriaId": "307FB584-44E5-4A1C-B219-E438D9C0CF5C"
}
]
}
@ -576,21 +94,53 @@
}
],
"references": [
{
"url": "http://osvdb.org/57456",
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36498",
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36499",
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml",
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36152",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1022775",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-2726",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-12T10:30:01.110",
"lastModified": "2018-10-10T19:42:05.157",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:05:21.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-770"
}
]
}
@ -62,763 +62,90 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:business_edition:b.1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8086337E-5020-43E7-9BAB-62AA22A354AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:business_edition:c.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "30C6D2DE-1F8F-4319-B254-D35E71083220"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:business_edition:c.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "17D78AA8-AF67-4343-A9B0-EFC63D8CC4BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E816CCDB-4169-4F09-AE87-E467F4BE7685"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*",
"matchCriteriaId": "65223182-1675-462C-AF67-4A48760A63F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*",
"matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*",
"matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*",
"matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*",
"matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*",
"matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*",
"matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*",
"matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*",
"matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "E7C0897A-C841-4AAB-A6B3-1FCF7A99A60A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*",
"matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*",
"matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*",
"matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*",
"matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*",
"matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*",
"matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*",
"matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*",
"matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*",
"matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*",
"matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*",
"matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*",
"matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*",
"matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
"matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*",
"matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "4359322B-08D0-4710-A9C3-54BD4A17B800"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78F84DF4-DBA7-430C-AF17-F52024EF80D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.3:*:*:*:*:*:*:*",
"matchCriteriaId": "34266614-3588-485C-A609-37823F8499AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DD299B8E-D912-4B67-85C3-79CFF4C4F3E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc-2:*:*:*:*:*:*",
"matchCriteriaId": "D35DD57B-EF77-4C5F-9B44-DAF5E0560E22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "AB77E88B-7233-4979-914E-24E671C1FB23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8E9FE3-FA25-4054-876E-4A3CE6E71AFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.19_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "2D41604A-21CB-4EF3-85E8-8CD170C8013F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "4BBAEADC-D1DE-46EF-808C-2F6D2A74D988"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AEF8EB4B-2947-4BD3-ADF3-345AEFE85B05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E4476FB3-A759-49F5-ABDE-6D2A321B61BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DFC109C3-2F52-48BE-B07E-3D65F31C1012"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E54101A9-3967-4111-8A03-DA1BB23141BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D8B00600-1D45-41F7-9A10-97FB39012FDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D8CB2331-0F95-45E0-AF5B-0B9C74C5BA88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4ADB6A7-76AC-4AE3-B1AA-9F8DFA635418"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "776BC35C-CF37-4F4E-9FD5-EC351D4C2C2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F10DAABC-FF06-44FB-98EC-B6AD17C03FBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc3:*:*:*:*:*:*",
"matchCriteriaId": "ACA8AFD5-4C7C-4876-93CA-C5B3E881C455"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc4:*:*:*:*:*:*",
"matchCriteriaId": "547EEB2B-2ECA-4B00-83BB-CFAA11BE0145"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83829E0F-C24B-4BD6-88EA-98898A9AD86E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C19141-823E-4057-A699-FD1DFF92DF38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE7FE41-E749-49B8-99DF-19F9E7C4827A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4E78234B-39B6-4DB4-A10F-AA55F174D4F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3984CF42-2431-4661-B333-C6721DF7123A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc3:*:*:*:*:*:*",
"matchCriteriaId": "303CBFC2-22C1-47CE-A26C-A99B05763374"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "D4F88914-6097-4AF1-8337-DCF062EB88AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8BDB49DC-5344-451E-B8D6-D02C3431CE78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "B1FDA8D3-5082-479B-BA0A-F1E83D750B5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "7305910F-42BA-44CE-A7AC-B6F74200B68D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "B93EB4D6-3375-44BC-870F-714A3BC00C2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "52F60D6E-64EB-4223-8A79-595693B444C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7.1:*:*:*:*:*:*",
"matchCriteriaId": "37CF29B9-4397-4298-9326-0443E666CDC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "7D85DA34-A977-4A82-8E79-7BFE064DE9EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta9:*:*:*:*:*:*",
"matchCriteriaId": "1476EF7B-A6F8-4B10-AF0F-986EA6BA3116"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "98E222F0-4CAA-4247-A00D-C6CEC2E55198"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "63744245-6126-47F6-B9F5-E936538140C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "C8805BEE-A4CF-45C2-B948-F1E8EF0A0886"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4E474C33-B42A-4BB8-AC57-8A9071316240"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B83B3132-7D78-4AC3-B83A-A6A20AA28993"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0147FCED-AE75-4945-B76E-33F2AA764B9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9C976AB0-2D1A-40CA-AEC3-E271B59B6960"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:open_source:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6613838D-452D-45B4-814D-102C0C86C31E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:opensource:1.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "9E5BFF9D-13AD-4278-9600-F51E79747438"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:opensource:1.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFFD837-E531-458C-AC94-25B378E62000"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:asterisk:opensource:1.4.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "154A2A5F-8431-4E4F-B1E5-070C3BD0B591"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:asterisk:appliance_s800i:1.3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B08893AA-F51D-44CA-97C1-8E7E5A7A7F54"
"criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*",
"versionEndExcluding": "b.2.5.9",
"matchCriteriaId": "C7DBF0A2-9606-43EF-88E6-905B4864D377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*",
"versionStartIncluding": "c.2.0",
"versionEndIncluding": "c.2.4.1",
"matchCriteriaId": "945FA0F6-42A8-4AF4-9EF6-4B16D08B2724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*",
"versionStartIncluding": "c.3.0",
"versionEndExcluding": "c.3.1",
"matchCriteriaId": "7375080A-38B8-4230-875B-FC6184F23792"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:digium:s800i_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndExcluding": "1.3.0.3",
"matchCriteriaId": "3E7FEE3E-B19C-4E7E-92D6-D0032A5DAA59"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15C35F93-0E57-4AEB-AA5F-4EDFAE753451"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndExcluding": "1.2.34",
"matchCriteriaId": "86564062-C367-4652-820A-7B4700011463"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.4.0",
"versionEndExcluding": "1.4.26.1",
"matchCriteriaId": "2CD3CE8A-7145-4501-A61A-D29F575E8795"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.6.0",
"versionEndExcluding": "1.6.0.12",
"matchCriteriaId": "9E6BB86F-2FC7-4830-AC2E-4F114D87FE4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.6.1",
"versionEndExcluding": "1.6.1.4",
"matchCriteriaId": "A4DBF98F-EF1D-4DC0-93FE-2EC280AAA5EF"
}
]
}
@ -828,31 +155,59 @@
"references": [
{
"url": "http://downloads.digium.com/pub/security/AST-2009-005.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36227",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/36015",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1022705",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/2229",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2009-3547",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-11-04T15:30:00.640",
"lastModified": "2023-11-03T17:14:08.203",
"lastModified": "2024-02-15T21:12:00.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -75,6 +75,10 @@
{
"lang": "en",
"value": "CWE-476"
},
{
"lang": "en",
"value": "CWE-672"
}
]
}
@ -522,8 +526,7 @@
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-3616",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-10-23T18:30:00.390",
"lastModified": "2020-11-02T14:39:17.710",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:06:20.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-416"
}
]
}
@ -65,181 +87,26 @@
"criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.10.6",
"matchCriteriaId": "27270035-8337-4B8E-8305-951D7063F2D1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC82CD08-F151-489C-9BC4-50C8C9583718"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "75D04344-C6CE-40D5-97ED-42B3DBA1AAD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "71CC4D45-66BE-4C23-B541-DD4604ACC9FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E41058D-380C-4098-96FB-53CC158ED420"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE12226-C599-45A2-8CFD-32753F94204B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F8832-B32F-4352-B048-A4ADCE85373E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5278C685-988B-40D7-9AE9-B4FB8AF41C8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C6B20B-2E5D-4D25-885A-227A4BE5EEBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FF7251-031D-4A9B-9AF0-1FFE556456D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D942D17-1AA9-4D5A-8F5E-0F4F762522D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2519BF-5F68-4096-8DE2-2C7BCF7200D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6B00BD71-2AE5-47BA-999A-7E89590B86C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6701A9-78CC-49D0-A40A-CB1C774400AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40B5A7F2-B5B2-46CF-BBD0-AB986A8E55EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEBD56F-EFBC-4620-A77C-E215A7AFDAFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C45EA44-ECD1-40A7-89CE-D770BDC9DB4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "83088B0F-A6F8-4F47-99C0-09FEA234272F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "17E948D4-6C1A-43D2-B128-1A728FD61703"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6470915C-CA3C-42CA-B69B-0FC40A33D02D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "759505BA-6F19-4BAE-8297-D8F30EEC8D8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A98CC34-2DB7-46CD-AA60-A7C08DDF22B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E424B63B-DCD8-4209-A4CB-84C1EDF5B255"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F9576AA2-2FDD-4063-8D84-DE8DB063AC54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "544368B2-37BE-41DD-8DC2-F04B6A394696"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14A6B570-09CE-4AFF-AC8C-51F37FC79811"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5670FB-B9EA-4B9C-BB7B-575494F12CA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27650033-1C9F-4175-A26F-D9082A36F079"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F1D35E0-2033-4ADE-9ADA-3B45996B53B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6205775B-4A83-498F-A60E-54473F5D5704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "39A6382B-A08C-4D58-B3F9-D74132A74B86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7483B9F2-246C-4B78-9EFA-7734B7209054"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A83436B8-AFC9-4AA2-8414-1F703812718D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BCA47F54-B59B-45EC-B5D4-DF544E4BE1AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4786DEA6-6F23-4969-B7E0-C664FCB2284E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EA3CABBB-9C1F-4ACD-A2AC-8320348DDA99"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
}
]
}
@ -251,6 +118,7 @@
"url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Exploit"
]
},
@ -258,40 +126,71 @@
"url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "http://marc.info/?l=qemu-devel&m=124324043812915",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://rhn.redhat.com/errata/RHEA-2009-1272.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/5",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/10/16/8",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/36716",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=501131",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=505641",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=508567",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-4017",
"sourceIdentifier": "secalert@redhat.com",
"published": "2009-11-24T00:30:00.500",
"lastModified": "2018-10-10T19:48:06.190",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:16:16.510",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-770"
}
]
}
@ -62,13 +62,84 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDFB7E9-8510-430F-BFBC-FD811D60DC78"
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.12",
"matchCriteriaId": "F2304370-EDAF-4417-B624-498C427EBF53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF"
"criteria": "cpe:2.3:a:php:php:5.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A315BCF0-71F5-4664-B25B-019B8A1075BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "1DF14239-64E0-46F0-A8DE-8BB11EEC2F1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "BDC814D7-52A0-4610-B812-1F47C08BEF8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "9E66A080-A759-41BA-99A6-70074DF2A1E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "F9D343FF-1DC6-477C-8DBA-D3C309D1B9BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1F397590-70B4-43B9-9F5B-BC1020393A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17586008-7FBC-4238-B208-4563040D1982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F5D02F98-10F7-4F7B-A31E-7C28EC034BBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "8F021309-38E4-4D19-B1EB-975D9F42F4F3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
}
]
}
@ -78,94 +149,187 @@
"references": [
{
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=127680701405735&w=2",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://news.php.net/php.announce/79",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Release Notes"
]
},
{
"url": "http://seclists.org/fulldisclosure/2009/Nov/228",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/37482",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/37821",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/40262",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/41480",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/41490",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.apple.com/kb/HT4077",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1940",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:303",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:305",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/2",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2009/11/20/7",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.php.net/ChangeLog-5.php",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://www.php.net/releases/5_2_12.php",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Release Notes"
]
},
{
"url": "http://www.php.net/releases/5_3_1.php",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/507982/100/0/threaded",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3593",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54455",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,9 +2,9 @@
"id": "CVE-2010-0249",
"sourceIdentifier": "secure@microsoft.com",
"published": "2010-01-15T17:30:00.533",
"lastModified": "2019-02-26T14:04:01.963",
"vulnStatus": "Modified",
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/416.htmlhttp://cwe.mitre.org/data/definitions/416.html\r\n\r\nCWE-416: Use After Free",
"lastModified": "2024-02-15T21:06:48.057",
"vulnStatus": "Analyzed",
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/416.htmlhttp://cwe.mitre.org/data/definitions/416.html\n\nCWE-416: Use After Free",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -49,7 +71,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-416"
}
]
}
@ -64,23 +86,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*",
"matchCriteriaId": "2EB39B99-91A0-4B70-B12A-BA37F6AFBA83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
}
]
},
@ -90,8 +102,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_2000:sp4:*:*:*:*:*:*:*",
"matchCriteriaId": "11AFB73A-1C61-40F1-8415-E4D40BB2699B"
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
"matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5"
}
]
}
@ -106,23 +118,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*",
"matchCriteriaId": "0C69B5E6-D1AF-46F1-8AE6-DD5D4E3D9160"
}
]
},
@ -132,13 +129,60 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*",
"matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC71FD8-D385-4507-BD14-B75FDD4C79E6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*",
"matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
},
{
"vulnerable": false,
@ -152,33 +196,115 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*",
"matchCriteriaId": "E20CAA29-B5A9-4D99-9775-4945469C3A9A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*",
"matchCriteriaId": "889F98DA-4266-470B-AE3D-480BDF6BADB9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*",
"matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*",
"matchCriteriaId": "E69F8C21-5996-4083-A02A-F04AE948CEA9"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*",
"matchCriteriaId": "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*",
"matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*",
"matchCriteriaId": "E20CAA29-B5A9-4D99-9775-4945469C3A9A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*",
"matchCriteriaId": "889F98DA-4266-470B-AE3D-480BDF6BADB9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*",
"matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
@ -190,32 +316,55 @@
"url": "http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://news.cnet.com/8301-27080_3-10435232-245.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://osvdb.org/61697",
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1023462",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://support.microsoft.com/kb/979352",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.exploit-db.com/exploits/11167",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/492515",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
@ -223,6 +372,8 @@
"url": "http://www.microsoft.com/technet/security/advisory/979352.mspx",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
@ -230,31 +381,50 @@
"url": "http://www.securityfocus.com/bid/37815",
"source": "secure@microsoft.com",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA10-055A.html",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2010/0135",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55642",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-1591",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-01-31T23:55:01.037",
"lastModified": "2019-05-22T13:29:00.273",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:08:00.480",
"vulnStatus": "Analyzed",
"evaluatorComment": "Adding additional products per \n\nhttp://rhn.redhat.com/errata/RHSA-2013-0687.html\n\nRed Hat Enterprise Linux 6\n\nhttp://rhn.redhat.com/errata/RHSA-2013-0746.html\n\nRed Hat Enterprise Virtualization 3",
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -49,7 +71,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -94,153 +116,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*",
"versionEndIncluding": "15.3.2",
"matchCriteriaId": "72E237ED-4EE8-43ED-9927-89B2DC70E615"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EF53A010-E526-44F0-B52F-5D4084363A72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C587591A-7B7C-4FCB-ABAC-CC879DB28D53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C8F0AF44-2944-4D7D-9E79-F88EF47E2FFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE971AB-4919-4260-96C9-0A95AD1265A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "401A541A-DCD9-4AE5-9080-056F375F3F27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD483627-6FFC-4DF9-9B19-3FA5FB79BBD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FBA6FA7-B579-482D-AFE0-58ED482AE518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0773C61-B6B0-48EE-A231-ABAA3BF1C3F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FF328C-4897-4317-8F79-BFDCD5EC4394"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C71B58E7-DDA9-4A87-A4C1-3B21F082924E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B280BFE5-FF46-44C6-BC54-51694A96781A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "931C0E2A-4750-431F-9F7B-F15F8C4153E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8140D29C-F0D8-48EC-B5FE-1561871437E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED21EE76-1C79-4232-97FB-03D5CCEB97BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "325CB2E9-5EA1-44BE-B565-D59BDD4317A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "374BF6AB-5E7E-477D-9A6B-511BDFEAEED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B055FDB0-E787-45E7-9BD1-7C5042FCB32F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "797419CD-C40E-4752-8148-1FC79517863A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27157FE6-B356-41D2-9231-289ADD70B57E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:12.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08A65FA-2485-4E24-99E7-66DF375BDE7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9665CC3-077C-4F8D-A6F8-7BC1AC5B3BFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:12.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "F58FB782-79A3-48C2-90EF-CC2C93A0976C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F7B8D10-57B4-4F84-8B39-94E3141946C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "008AB17C-2121-4E26-A104-F808D35BB40E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "67718722-1B66-42E4-A161-9CC493DC1C7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "82AD08D0-2FD7-4C4B-939E-5774A35683A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C640C804-C6FA-4B27-A7E3-7DFEFB096EA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "40EA799F-EE5E-4349-9C12-8D883F643495"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palemoon:pale_moon:15.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20C7D39F-A609-4F5F-B8B2-CDDCE19C7C61"
"versionEndExcluding": "15.4",
"matchCriteriaId": "DC382A9A-521E-4EF7-8EAC-F262B26E4170"
}
]
}
@ -252,7 +129,7 @@
"url": "http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Patch"
]
},
@ -260,39 +137,52 @@
"url": "http://rhn.redhat.com/errata/RHSA-2013-0687.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:116",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.palemoon.org/releasenotes-ng.shtml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=910149",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://support.f5.com/csp/article/K51392553",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-1000121",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-11-01T21:29:00.280",
"lastModified": "2017-11-21T19:22:16.807",
"lastModified": "2024-02-15T21:22:29.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -98,7 +98,7 @@
"url": "http://trac.webkit.org/changeset/217126/webkit",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
"Patch"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-15100",
"sourceIdentifier": "secalert@redhat.com",
"published": "2017-11-27T14:29:00.397",
"lastModified": "2023-02-12T23:28:25.533",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:36:51.383",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -101,6 +101,26 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:satellite:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB283C80-F7AF-4776-8432-655E50D7D65B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "461407B5-C167-4DE1-A934-FD5ADFB4AD4E"
}
]
}
]
}
],
"references": [
@ -108,12 +128,16 @@
"url": "http://projects.theforeman.org/issues/21519",
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2018:2927",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/theforeman/foreman/pull/4967",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9534",
"sourceIdentifier": "cret@cert.org",
"published": "2019-10-10T20:15:11.537",
"lastModified": "2019-10-16T18:07:27.007",
"lastModified": "2024-02-15T21:20:26.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-434"
"value": "CWE-494"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-17087",
"sourceIdentifier": "secure@microsoft.com",
"published": "2020-11-11T07:15:18.997",
"lastModified": "2023-12-31T19:15:29.023",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:27:14.377",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -94,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "CWE-681"
"value": "CWE-131"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3011",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-07T16:15:12.120",
"lastModified": "2023-07-20T18:53:46.410",
"lastModified": "2024-02-15T21:20:33.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-203"
"value": "CWE-670"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3116",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-11T05:15:10.987",
"lastModified": "2021-01-14T15:09:25.177",
"lastModified": "2024-02-15T21:40:16.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-697"
}
]
}
@ -106,16 +106,14 @@
"url": "https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
"url": "https://pypi.org/project/proxy.py/2.3.1/#history",
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
"Product"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1511",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-28T15:15:09.637",
"lastModified": "2023-06-29T09:15:10.767",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:31:56.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1796",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-19T16:15:07.903",
"lastModified": "2023-05-03T12:15:31.513",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:28:57.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -151,7 +151,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202305-16",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-26833",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2022-05-25T21:15:08.250",
"lastModified": "2023-07-26T18:15:10.767",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:26:52.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 5.5
},
{
"source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30308",
"sourceIdentifier": "info@cert.vde.com",
"published": "2022-06-13T14:15:09.097",
"lastModified": "2023-08-10T08:15:09.227",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:23:56.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30310",
"sourceIdentifier": "info@cert.vde.com",
"published": "2022-06-13T14:15:09.227",
"lastModified": "2023-08-10T08:15:09.683",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:23:18.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31001",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-05-31T20:15:07.850",
"lastModified": "2023-05-24T21:15:10.540",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:24:56.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -132,6 +132,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
@ -172,7 +177,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5410",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31216",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2022-06-15T19:15:11.367",
"lastModified": "2023-09-13T04:15:09.910",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:22:59.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,7 +11,7 @@
},
{
"lang": "es",
"value": "Unas vulnerabilidades en Drive Composer permiten a un atacante con pocos privilegios crear y escribir en un archivo en cualquier parte del sistema de archivos como SYSTEM con contenido arbitrario siempre que el archivo no exista ya. El archivo de instalaci\u00f3n de Drive Composer permite a un usuario con pocos privilegios ejecutar una operaci\u00f3n de \"reparaci\u00f3n\" en el producto"
"value": "Las vulnerabilidades en Drive Composer permiten a un atacante con pocos privilegios crear y escribir en un archivo en cualquier lugar del sistema de archivos como SYSTEM con contenido arbitrario, siempre y cuando el archivo no exista ya. El archivo de instalaci\u00f3n de Drive Composer permite a un usuario con pocos privilegios ejecutar una operaci\u00f3n de \"repair\" en el producto."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3391",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-23T16:15:09.693",
"lastModified": "2023-12-26T19:56:27.157",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:18:21.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-40057",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-02-15T21:15:08.247",
"lastModified": "2024-02-15T21:15:08.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40057",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45269",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T16:15:12.853",
"lastModified": "2023-11-15T17:15:41.743",
"vulnStatus": "Modified",
"lastModified": "2024-02-15T21:47:21.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:coleds:simple_seo:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0.23",
"matchCriteriaId": "C92E0C08-77BE-43FA-AF92-C8931442A1E9"
"versionEndExcluding": "2.0.26",
"matchCriteriaId": "3CCD0E06-BF40-4076-857E-6D119723FA3E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50858",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-28T11:15:10.120",
"lastModified": "2024-01-05T16:24:19.057",
"lastModified": "2024-02-15T21:38:57.473",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -79,9 +79,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:billminozzi:anit_hacker:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:billminozzi:anti_hacker:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.34",
"matchCriteriaId": "C9443507-F4F2-43FD-87EC-83914F8B413E"
"matchCriteriaId": "8231C740-A3C3-4FE6-95D8-020678839942"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51480",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-10T09:15:07.990",
"lastModified": "2024-02-15T06:26:21.503",
"lastModified": "2024-02-15T21:06:20.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -89,8 +89,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pluginus:active_products_tables_for_woocommerce:1.0.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "327A99ED-90FE-4043-903F-B8CE8F5772EF"
"criteria": "cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.6",
"matchCriteriaId": "573AA7BD-EB43-41C2-96DB-142251E723FB"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-6123",
"sourceIdentifier": "security@opentext.com",
"published": "2024-02-15T21:15:08.500",
"lastModified": "2024-02-15T21:15:08.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization vulnerability affects OpenText ALM Octane\u00a0version 16.2.100 and above.\u00a0The vulnerability could result in a remote code execution attack. \n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000026128?language=en_US",
"source": "security@opentext.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-0240",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-15T21:15:08.673",
"lastModified": "2024-02-15T21:15:08.673",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A memory leak in the Silicon Labs' Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/069Vm000001AjEfIAK",
"source": "product-security@silabs.com"
},
{
"url": "https://github.com/SiliconLabs/gecko_sdk",
"source": "product-security@silabs.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0622",
"sourceIdentifier": "security@opentext.com",
"published": "2024-02-15T21:15:08.860",
"lastModified": "2024-02-15T21:15:08.860",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation vulnerability\u00a0affects OpenText Operations Agent product versions 12.15 and 12.20-12.25 when installed on no-Windows platforms. The vulnerability\u00a0could allow local privilege escalation.\u00a0\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000026555?language=en_US",
"source": "security@opentext.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0646",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-17T16:15:47.190",
"lastModified": "2024-02-07T21:15:09.327",
"lastModified": "2024-02-15T21:15:09.070",
"vulnStatus": "Modified",
"descriptions": [
{
@ -141,6 +141,14 @@
"url": "https://access.redhat.com/errata/RHSA-2024:0725",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0850",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0851",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0646",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-21728",
"sourceIdentifier": "security@joomla.org",
"published": "2024-02-15T21:15:09.220",
"lastModified": "2024-02-15T21:15:09.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An Open Redirect vulnerability was found in osTicky2 below 2.2.8. osTicky (osTicket Bridge) by SmartCalc is a Joomla 3.x extension that provides Joomla fronted integration with osTicket, a popular Support ticket system. The Open Redirect vulnerability allows attackers to control the return parameter in the URL to a base64 malicious URL."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/solracsf/osTicky",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23476",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-02-15T21:15:09.353",
"lastModified": "2024-02-15T21:15:09.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve the Remote Code Execution.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23476",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23477",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-02-15T21:15:09.603",
"lastModified": "2024-02-15T21:15:09.603",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23477",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23478",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-02-15T21:15:09.867",
"lastModified": "2024-02-15T21:15:09.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service, resulting in remote code execution.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23478",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23479",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-02-15T21:15:10.213",
"lastModified": "2024-02-15T21:15:10.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23479",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-25123",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-15T22:15:48.060",
"lastModified": "2024-02-15T22:15:48.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "MSS (Mission Support System) is an open source package designed for planning atmospheric research flights. In file: `index.py`, there is a method that is vulnerable to path manipulation attack. By modifying file paths, an attacker can acquire sensitive information from different resources. The `filename` variable is joined with other variables to form a file path in `_file`. However, `filename` is a route parameter that can capture path type values i.e. values including slashes (\\). So it is possible for an attacker to manipulate the file being read by assigning a value containing ../ to `filename` and so the attacker may be able to gain access to other files on the host filesystem. This issue has been addressed in MSS version 8.3.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/Open-MSS/MSS/commit/f23033729ee930b97f8bdbd07df0174311c9b658",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-15T21:00:26.928151+00:00
2024-02-15T23:00:24.830948+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-15T20:59:49.467000+00:00
2024-02-15T22:15:48.060000+00:00
```
### Last Data Feed Release
@ -29,46 +29,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
238692
238702
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `10`
* [CVE-2024-25373](CVE-2024/CVE-2024-253xx/CVE-2024-25373.json) (`2024-02-15T19:15:14.750`)
* [CVE-2024-25502](CVE-2024/CVE-2024-255xx/CVE-2024-25502.json) (`2024-02-15T20:15:45.483`)
* [CVE-2023-40057](CVE-2023/CVE-2023-400xx/CVE-2023-40057.json) (`2024-02-15T21:15:08.247`)
* [CVE-2023-6123](CVE-2023/CVE-2023-61xx/CVE-2023-6123.json) (`2024-02-15T21:15:08.500`)
* [CVE-2024-0240](CVE-2024/CVE-2024-02xx/CVE-2024-0240.json) (`2024-02-15T21:15:08.673`)
* [CVE-2024-0622](CVE-2024/CVE-2024-06xx/CVE-2024-0622.json) (`2024-02-15T21:15:08.860`)
* [CVE-2024-21728](CVE-2024/CVE-2024-217xx/CVE-2024-21728.json) (`2024-02-15T21:15:09.220`)
* [CVE-2024-23476](CVE-2024/CVE-2024-234xx/CVE-2024-23476.json) (`2024-02-15T21:15:09.353`)
* [CVE-2024-23477](CVE-2024/CVE-2024-234xx/CVE-2024-23477.json) (`2024-02-15T21:15:09.603`)
* [CVE-2024-23478](CVE-2024/CVE-2024-234xx/CVE-2024-23478.json) (`2024-02-15T21:15:09.867`)
* [CVE-2024-23479](CVE-2024/CVE-2024-234xx/CVE-2024-23479.json) (`2024-02-15T21:15:10.213`)
* [CVE-2024-25123](CVE-2024/CVE-2024-251xx/CVE-2024-25123.json) (`2024-02-15T22:15:48.060`)
### CVEs modified in the last Commit
Recently modified CVEs: `73`
Recently modified CVEs: `44`
* [CVE-2023-6255](CVE-2023/CVE-2023-62xx/CVE-2023-6255.json) (`2024-02-15T19:55:09.230`)
* [CVE-2023-7081](CVE-2023/CVE-2023-70xx/CVE-2023-7081.json) (`2024-02-15T19:55:09.230`)
* [CVE-2023-6937](CVE-2023/CVE-2023-69xx/CVE-2023-6937.json) (`2024-02-15T19:55:09.230`)
* [CVE-2023-46838](CVE-2023/CVE-2023-468xx/CVE-2023-46838.json) (`2024-02-15T19:56:49.537`)
* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-15T20:00:45.203`)
* [CVE-2023-40083](CVE-2023/CVE-2023-400xx/CVE-2023-40083.json) (`2024-02-15T20:25:39.540`)
* [CVE-2023-40082](CVE-2023/CVE-2023-400xx/CVE-2023-40082.json) (`2024-02-15T20:46:11.673`)
* [CVE-2023-6508](CVE-2023/CVE-2023-65xx/CVE-2023-6508.json) (`2024-02-15T20:49:32.050`)
* [CVE-2023-6509](CVE-2023/CVE-2023-65xx/CVE-2023-6509.json) (`2024-02-15T20:50:04.510`)
* [CVE-2023-6510](CVE-2023/CVE-2023-65xx/CVE-2023-6510.json) (`2024-02-15T20:50:56.927`)
* [CVE-2023-6511](CVE-2023/CVE-2023-65xx/CVE-2023-6511.json) (`2024-02-15T20:51:23.697`)
* [CVE-2023-6512](CVE-2023/CVE-2023-65xx/CVE-2023-6512.json) (`2024-02-15T20:51:30.973`)
* [CVE-2023-40653](CVE-2023/CVE-2023-406xx/CVE-2023-40653.json) (`2024-02-15T20:53:14.203`)
* [CVE-2023-40079](CVE-2023/CVE-2023-400xx/CVE-2023-40079.json) (`2024-02-15T20:53:24.200`)
* [CVE-2023-40080](CVE-2023/CVE-2023-400xx/CVE-2023-40080.json) (`2024-02-15T20:53:30.253`)
* [CVE-2023-40081](CVE-2023/CVE-2023-400xx/CVE-2023-40081.json) (`2024-02-15T20:58:09.707`)
* [CVE-2024-0242](CVE-2024/CVE-2024-02xx/CVE-2024-0242.json) (`2024-02-15T19:08:40.337`)
* [CVE-2024-0657](CVE-2024/CVE-2024-06xx/CVE-2024-0657.json) (`2024-02-15T19:09:46.313`)
* [CVE-2024-0842](CVE-2024/CVE-2024-08xx/CVE-2024-0842.json) (`2024-02-15T19:11:14.253`)
* [CVE-2024-1122](CVE-2024/CVE-2024-11xx/CVE-2024-1122.json) (`2024-02-15T19:17:26.630`)
* [CVE-2024-24308](CVE-2024/CVE-2024-243xx/CVE-2024-24308.json) (`2024-02-15T19:34:49.943`)
* [CVE-2024-22119](CVE-2024/CVE-2024-221xx/CVE-2024-22119.json) (`2024-02-15T19:35:45.447`)
* [CVE-2024-25677](CVE-2024/CVE-2024-256xx/CVE-2024-25677.json) (`2024-02-15T19:43:24.983`)
* [CVE-2024-20305](CVE-2024/CVE-2024-203xx/CVE-2024-20305.json) (`2024-02-15T19:56:38.910`)
* [CVE-2024-22216](CVE-2024/CVE-2024-222xx/CVE-2024-22216.json) (`2024-02-15T20:09:29.663`)
* [CVE-2009-3616](CVE-2009/CVE-2009-36xx/CVE-2009-3616.json) (`2024-02-15T21:06:20.270`)
* [CVE-2009-3547](CVE-2009/CVE-2009-35xx/CVE-2009-3547.json) (`2024-02-15T21:12:00.877`)
* [CVE-2009-2054](CVE-2009/CVE-2009-20xx/CVE-2009-2054.json) (`2024-02-15T21:15:40.407`)
* [CVE-2009-4017](CVE-2009/CVE-2009-40xx/CVE-2009-4017.json) (`2024-02-15T21:16:16.510`)
* [CVE-2009-1073](CVE-2009/CVE-2009-10xx/CVE-2009-1073.json) (`2024-02-15T21:31:04.530`)
* [CVE-2010-0249](CVE-2010/CVE-2010-02xx/CVE-2010-0249.json) (`2024-02-15T21:06:48.057`)
* [CVE-2013-1591](CVE-2013/CVE-2013-15xx/CVE-2013-1591.json) (`2024-02-15T21:08:00.480`)
* [CVE-2017-1000121](CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json) (`2024-02-15T21:22:29.757`)
* [CVE-2017-15100](CVE-2017/CVE-2017-151xx/CVE-2017-15100.json) (`2024-02-15T21:36:51.383`)
* [CVE-2019-9534](CVE-2019/CVE-2019-95xx/CVE-2019-9534.json) (`2024-02-15T21:20:26.287`)
* [CVE-2020-17087](CVE-2020/CVE-2020-170xx/CVE-2020-17087.json) (`2024-02-15T21:27:14.377`)
* [CVE-2021-3011](CVE-2021/CVE-2021-30xx/CVE-2021-3011.json) (`2024-02-15T21:20:33.287`)
* [CVE-2021-3116](CVE-2021/CVE-2021-31xx/CVE-2021-3116.json) (`2024-02-15T21:40:16.967`)
* [CVE-2022-31216](CVE-2022/CVE-2022-312xx/CVE-2022-31216.json) (`2024-02-15T21:22:59.000`)
* [CVE-2022-30310](CVE-2022/CVE-2022-303xx/CVE-2022-30310.json) (`2024-02-15T21:23:18.460`)
* [CVE-2022-30308](CVE-2022/CVE-2022-303xx/CVE-2022-30308.json) (`2024-02-15T21:23:56.537`)
* [CVE-2022-31001](CVE-2022/CVE-2022-310xx/CVE-2022-31001.json) (`2024-02-15T21:24:56.693`)
* [CVE-2022-26833](CVE-2022/CVE-2022-268xx/CVE-2022-26833.json) (`2024-02-15T21:26:52.767`)
* [CVE-2022-1796](CVE-2022/CVE-2022-17xx/CVE-2022-1796.json) (`2024-02-15T21:28:57.780`)
* [CVE-2022-1511](CVE-2022/CVE-2022-15xx/CVE-2022-1511.json) (`2024-02-15T21:31:56.087`)
* [CVE-2023-51480](CVE-2023/CVE-2023-514xx/CVE-2023-51480.json) (`2024-02-15T21:06:20.197`)
* [CVE-2023-3391](CVE-2023/CVE-2023-33xx/CVE-2023-3391.json) (`2024-02-15T21:18:21.387`)
* [CVE-2023-50858](CVE-2023/CVE-2023-508xx/CVE-2023-50858.json) (`2024-02-15T21:38:57.473`)
* [CVE-2023-45269](CVE-2023/CVE-2023-452xx/CVE-2023-45269.json) (`2024-02-15T21:47:21.370`)
* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-02-15T21:15:09.070`)
## Download and Usage