diff --git a/CVE-2001/CVE-2001-06xx/CVE-2001-0609.json b/CVE-2001/CVE-2001-06xx/CVE-2001-0609.json index a260c3a3a04..bbf8d6457c9 100644 --- a/CVE-2001/CVE-2001-06xx/CVE-2001-0609.json +++ b/CVE-2001/CVE-2001-06xx/CVE-2001-0609.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0609", "sourceIdentifier": "cve@mitre.org", "published": "2001-08-02T04:00:00.000", - "lastModified": "2017-12-19T02:29:23.910", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:29:32.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -61,21 +83,6 @@ "criteria": "cpe:2.3:a:infodrom:cfingerd:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.4.3", "matchCriteriaId": "1B8A7F9D-F2A9-4B7A-BDEA-CADC7A21421A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:infodrom:cfingerd:1.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BA2DDB49-F05D-4698-A29C-B9121D7C8B09" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:infodrom:cfingerd:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AA9E8C3B-C2D0-4242-AC80-6EB1A4ABBBCE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:infodrom:cfingerd:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6DB288-F853-4014-A3E7-751EBE34536E" } ] } @@ -87,6 +94,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0202.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -96,14 +104,21 @@ "url": "http://www.securityfocus.com/bid/2576", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6364", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-14xx/CVE-2001-1471.json b/CVE-2001/CVE-2001-14xx/CVE-2001-1471.json index fb1d5227fec..59fff25ca1b 100644 --- a/CVE-2001/CVE-2001-14xx/CVE-2001-1471.json +++ b/CVE-2001/CVE-2001-14xx/CVE-2001-1471.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1471", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-31T04:00:00.000", - "lastModified": "2017-07-11T01:29:09.023", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:06:58.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-665" } ] } @@ -58,23 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:phpbb_group:phpbb:1.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E15A5879-39FE-4BFF-B391-52EAA58D1A0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpbb_group:phpbb:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "581594BF-92CE-4B16-95DC-200E11C64591" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpbb_group:phpbb:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AEBFC1B3-8C7D-4B63-8E92-F1759EACA2BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:phpbb_group:phpbb:1.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E3575646-AF8E-4D33-97DE-E6EA468D9973" + "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.0", + "matchCriteriaId": "4176B2DC-A6FF-4A1C-ADC4-39F1D403FD73" } ] } @@ -84,11 +92,17 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/920931", @@ -102,13 +116,20 @@ "url": "http://www.securityfocus.com/bid/3167", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", - "Patch" + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1721.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1721.json index 71498f0b476..0eece5702e2 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1721.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1721.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1721", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:22.227", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:13:18.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -58,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:paul_l_daniels:altermime:0.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CF724DEE-61A0-4CC9-9268-14E94E732ED7" + "criteria": "cpe:2.3:a:pldaniels:altermime:0.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "1F797EB1-B648-4D82-BBC7-2972A931FC88" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:paul_l_daniels:altermime:0.1.11:*:*:*:*:*:*:*", - "matchCriteriaId": "F2F6F29C-DBCE-4223-ACC2-B5B1D4622AF2" + "criteria": "cpe:2.3:a:pldaniels:altermime:0.1.11:*:*:*:*:*:*:*", + "matchCriteriaId": "C8C8444C-AF8C-4AEF-9069-98FBE44F5851" } ] } @@ -74,18 +96,28 @@ "references": [ { "url": "http://www.pldaniels.com/altermime/CHANGELOG", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.securityfocus.com/bid/4650", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8992", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1745.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1745.json index 84a0bdcdbac..9d8f6c09d67 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1745.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1745.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1745", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2018-10-30T16:25:10.357", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:28:24.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -67,13 +89,31 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/268303", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.securityfocus.com/bid/4543", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8853", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json b/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json index 45682b6ce75..cf9448a72c2 100644 --- a/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json +++ b/CVE-2002/CVE-2002-18xx/CVE-2002-1816.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1816", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:35.527", + "lastModified": "2024-02-15T21:28:07.317", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -58,13 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:yann_ramin:atphttpd:0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "25F3EB3D-6568-4C76-BF12-0D67FF0E7B48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:yann_ramin:atphttpd:0.4b:*:*:*:*:*:*:*", - "matchCriteriaId": "A912DFC5-5D7B-4377-8E2E-A95664CFAAC6" + "criteria": "cpe:2.3:a:redshift:atphttpd:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.4b", + "matchCriteriaId": "0C118822-3AD5-4E3A-980A-22CC449FA562" } ] } @@ -76,20 +94,35 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0187.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] }, + { + "url": "http://secunia.com/advisories/7293", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://www.iss.net/security_center/static/10362.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/5956", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", - "Patch" + "Patch", + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2002/CVE-2002-18xx/CVE-2002-1820.json b/CVE-2002/CVE-2002-18xx/CVE-2002-1820.json index c7a24cd5f5b..3d4da5af7f5 100644 --- a/CVE-2002/CVE-2002-18xx/CVE-2002-1820.json +++ b/CVE-2002/CVE-2002-18xx/CVE-2002-1820.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1820", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:36.120", + "lastModified": "2024-02-15T21:19:31.723", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -58,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "63D4AA57-F9FD-423D-8AE9-A6606009152E" + "criteria": "cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "6644F071-4F2F-4021-BAF2-B5DC3BA2E264" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.0_beta:*:*:*:*:*:*:*", - "matchCriteriaId": "122A4771-B26A-457C-8E97-47BA813E74B6" + "criteria": "cpe:2.3:a:ultimate_php_board_project:ultimate_php_board:1.0:beta:*:*:*:*:*:*", + "matchCriteriaId": "0BBCBEC8-C540-49DB-AAF6-84A8AAB8B588" } ] } @@ -76,12 +98,27 @@ "url": "http://www.iss.net/security_center/static/9972.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, + { + "url": "http://www.securityfocus.com/archive/1/289417", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.securityfocus.com/bid/5580", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-06xx/CVE-2003-0625.json b/CVE-2003/CVE-2003-06xx/CVE-2003-0625.json index 18f785a08af..e8858674619 100644 --- a/CVE-2003/CVE-2003-06xx/CVE-2003-0625.json +++ b/CVE-2003/CVE-2003-06xx/CVE-2003-0625.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0625", "sourceIdentifier": "cve@mitre.org", "published": "2003-08-27T04:00:00.000", - "lastModified": "2016-10-18T02:36:02.540", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:12:33.500", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -62,13 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:xfstt:xfstt:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DA10E638-750B-477A-8F56-006D7030C0CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xfstt:xfstt:1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "BEB6FF4A-D43A-45C4-898E-AB3C53A09A33" + "criteria": "cpe:2.3:a:hadrons:xfstt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "E96C5BBF-1169-4481-A763-7A24D962C830" } ] } @@ -78,16 +96,24 @@ "references": [ { "url": "http://developer.berlios.de/forum/forum.php?forum_id=2819", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=105941103709264&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.debian.org/security/2003/dsa-360", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -96,7 +122,10 @@ "url": "http://www.securityfocus.com/bid/8255", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2003/CVE-2003-08xx/CVE-2003-0813.json b/CVE-2003/CVE-2003-08xx/CVE-2003-0813.json index 5a8f69ea108..846e7b2175a 100644 --- a/CVE-2003/CVE-2003-08xx/CVE-2003-0813.json +++ b/CVE-2003/CVE-2003-08xx/CVE-2003-0813.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0813", "sourceIdentifier": "cve@mitre.org", "published": "2003-11-17T05:00:00.000", - "lastModified": "2019-04-30T14:27:13.913", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:19:53.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-367" } ] } @@ -60,16 +60,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", - "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", @@ -87,223 +77,38 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", - "matchCriteriaId": "E69D0E21-8C62-403E-8097-2CA403CBBB1B" + "criteria": "cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40FC681A-7B85-4495-8DCC-C459FE7E2F13" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", - "matchCriteriaId": "B127407D-AE50-4AFE-A780-D85B5AF44A2D" + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:*:*", + "matchCriteriaId": "DB28B8C1-9110-4780-A0CB-2188D1E86F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", - "matchCriteriaId": "5D42E51C-740A-4441-8BAF-D073111B984C" + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:terminal_server:*:*:*", + "matchCriteriaId": "8C5AA872-3652-4A44-8858-80F7E73AE610" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", - "matchCriteriaId": "34ACB544-87DD-4D9A-99F0-A10F48C1EE05" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:x64:*", + "matchCriteriaId": "D7FF4488-E42E-4895-8C25-D71E3969BF3B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", - "matchCriteriaId": "74AD256D-4BCE-41FB-AD73-C5C63A59A06D" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:x86:*", + "matchCriteriaId": "D70FFD93-4E29-4CBF-A6FF-08AF64757B99" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", - "matchCriteriaId": "B518E945-5FDE-4A37-878D-6946653C91F7" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "237D7C18-C8D6-4FDB-A160-FA17DD46A55A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*", - "matchCriteriaId": "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", - "matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*", - "matchCriteriaId": "35346A7B-2CB5-446D-B0C3-1F21D71A746D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "064F4E76-1B89-4FA5-97ED-64624285C014" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", - "matchCriteriaId": "089A953C-8446-4E6F-B506-430C38DF37B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", - "matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", - "matchCriteriaId": "416F06DD-980E-4A54-822D-CBA499FD1F86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "F66DC6FF-2B3D-4718-838F-9E055E89961F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", - "matchCriteriaId": "656AE014-AEEC-46E8-A696-61FEA7932F21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", - "matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", - "matchCriteriaId": "A08D0EA1-DA1B-4C52-883A-3F156F032517" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "DA267420-56C5-4697-B0AA-52932F78B24B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", - "matchCriteriaId": "93BA426E-DD51-44AC-BE78-3164670FF9E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", - "matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", - "matchCriteriaId": "02BE9817-E1AE-4619-8302-CA7AA4167F48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "363E3895-A19B-42EC-B479-765168DC0B17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", - "matchCriteriaId": "FBBBF25A-709B-4716-9894-AD82180091AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", - "matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", - "matchCriteriaId": "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "81B7961D-151D-4773-80CB-CCD0456BFEAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", - "matchCriteriaId": "82781A72-A34F-4668-9EE8-C203B04E3367" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", - "matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", - "matchCriteriaId": "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "B5CAF64E-98AA-4813-A2A2-5AC3387CF230" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", - "matchCriteriaId": "BCDFDBBA-6C4F-472A-9F4F-461C424794E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", - "matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", - "matchCriteriaId": "EDDD8DA8-D074-4543-AEDF-F856B5567F21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "CA7BA525-6DB8-4444-934A-932AFED69816" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", - "matchCriteriaId": "90CFA69B-7814-4F97-A14D-D76310065CF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", - "matchCriteriaId": "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", - "matchCriteriaId": "91D6D065-A28D-49DA-B7F4-38421FF86498" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*", - "matchCriteriaId": "B95B2BE4-B4E0-4B77-9999-53B9224F5CB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", - "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", - "matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", - "matchCriteriaId": "B3BBBB2E-1699-4E1E-81BB-7A394DD6B31D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*", - "matchCriteriaId": "ADEBB882-1C55-4B7B-B4CF-F1B23502FD90" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", - "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2572F7E5-75A3-4C11-866B-A4E9ADBD8D08" } ] } @@ -313,27 +118,45 @@ "references": [ { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=106579825211708&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=106588827513795&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=ntbugtraq&m=106580303918155&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.kb.cert.org/vuls/id/547820", @@ -346,16 +169,26 @@ }, { "url": "http://www.securityfocus.com/bid/8811", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitylab.ru/_exploits/rpc2.c.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA04-104A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, @@ -363,25 +196,39 @@ "url": "http://xforce.iss.net/xforce/alerts/id/155", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A893", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A894", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A900", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-01xx/CVE-2004-0119.json b/CVE-2004/CVE-2004-01xx/CVE-2004-0119.json index cb3b0153491..6fd0294e73b 100644 --- a/CVE-2004/CVE-2004-01xx/CVE-2004-0119.json +++ b/CVE-2004/CVE-2004-01xx/CVE-2004-0119.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0119", "sourceIdentifier": "cve@mitre.org", "published": "2004-06-01T04:00:00.000", - "lastModified": "2020-11-13T16:32:04.430", + "lastModified": "2024-02-15T21:44:29.990", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -108,6 +130,7 @@ "url": "http://www.securityfocus.com/bid/10113", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -116,6 +139,7 @@ "url": "http://www.us-cert.gov/cas/techalerts/TA04-104A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "US Government Resource" ] @@ -140,6 +164,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1808", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -147,6 +172,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1962", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -154,6 +180,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1997", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] } diff --git a/CVE-2004/CVE-2004-01xx/CVE-2004-0184.json b/CVE-2004/CVE-2004-01xx/CVE-2004-0184.json index 3a8b3bbb365..c95c6677735 100644 --- a/CVE-2004/CVE-2004-01xx/CVE-2004-0184.json +++ b/CVE-2004/CVE-2004-01xx/CVE-2004-0184.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0184", "sourceIdentifier": "cve@mitre.org", "published": "2004-05-04T04:00:00.000", - "lastModified": "2017-10-11T01:29:22.857", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:09:24.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,11 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-191" } ] } @@ -62,9 +66,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.8.1", - "matchCriteriaId": "F64FF8C5-C68F-4AD2-A370-1ACE4997AB3B" + "matchCriteriaId": "770A6EDA-10B7-4DB1-B150-A40F015FE3FB" } ] } @@ -74,16 +78,33 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=108067265931525&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/11258", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1009593", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.debian.org/security/2004/dsa-478", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -92,6 +113,7 @@ "url": "http://www.kb.cert.org/vuls/id/492558", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -99,41 +121,70 @@ "url": "http://www.rapid7.com/advisories/R7-0017.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-219.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/10004", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.tcpdump.org/tcpdump-changes.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.trustix.org/errata/2004/0015", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1468", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Issue Tracking" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15679", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9581", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A976", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-02xx/CVE-2004-0221.json b/CVE-2004/CVE-2004-02xx/CVE-2004-0221.json index dc18f2ff240..d650f13bb0c 100644 --- a/CVE-2004/CVE-2004-02xx/CVE-2004-0221.json +++ b/CVE-2004/CVE-2004-02xx/CVE-2004-0221.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0221", "sourceIdentifier": "cve@mitre.org", "published": "2004-05-04T04:00:00.000", - "lastModified": "2017-07-11T01:29:59.010", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:09:30.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-125" } ] } @@ -74,12 +74,17 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=108008530028019&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.kb.cert.org/vuls/id/524497", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -87,24 +92,42 @@ "url": "http://www.openbsd.org/errata.html", "source": "cve@mitre.org", "tags": [ + "Product", "Vendor Advisory" ] }, { "url": "http://www.rapid7.com/advisories/R7-0018.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/9907", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/alerts/2004/Mar/1009468.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15630", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-03xx/CVE-2004-0389.json b/CVE-2004/CVE-2004-03xx/CVE-2004-0389.json index 4aeee99956b..f27fcb9d5d7 100644 --- a/CVE-2004/CVE-2004-03xx/CVE-2004-0389.json +++ b/CVE-2004/CVE-2004-03xx/CVE-2004-0389.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0389", "sourceIdentifier": "cve@mitre.org", "published": "2004-06-01T04:00:00.000", - "lastModified": "2017-07-11T01:30:07.497", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:42:34.903", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-476" } ] } @@ -72,10 +94,19 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/11395", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://www.idefense.com/application/poi/display?id=102&type=vulnerabilities", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -85,12 +116,19 @@ "url": "http://www.securityfocus.com/bid/10157", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15880", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-05xx/CVE-2004-0594.json b/CVE-2004/CVE-2004-05xx/CVE-2004-0594.json index 4fed1df8a55..ee63742e3b0 100644 --- a/CVE-2004/CVE-2004-05xx/CVE-2004-0594.json +++ b/CVE-2004/CVE-2004-05xx/CVE-2004-0594.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0594", "sourceIdentifier": "cve@mitre.org", "published": "2004-07-27T04:00:00.000", - "lastModified": "2018-10-30T16:25:35.387", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:17:59.723", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-367" } ] } @@ -60,6 +60,16 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48A4B336-2D5B-4D9B-AA87-E5266FED05BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "37042CDE-E4FE-442E-891A-CD84433D36E2" + }, { "vulnerable": true, "criteria": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", @@ -67,13 +77,28 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F" + "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E6996B14-925B-46B8-982F-3545328B506B" + "criteria": "cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*", + "matchCriteriaId": "54C09E05-4FAA-4893-BF36-9DD967525C4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*", + "matchCriteriaId": "972D4ABF-2E80-4902-910D-5BD0CBEC9765" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*", + "matchCriteriaId": "DE7425AE-26A6-48A4-B883-C6220FCAC32B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*", + "matchCriteriaId": "12C73959-3E02-4847-8962-651D652800EE" }, { "vulnerable": true, @@ -102,293 +127,40 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*", - "matchCriteriaId": "D12D6986-429E-4152-A6E5-4CC1FB9556D3" + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.3.7", + "matchCriteriaId": "04AA8CFD-CEAD-455C-A96A-E1FE87196C86" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "245C601D-0FE7-47E3-8304-6FF45E9567D6" + "criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "691BB8BB-329A-4640-B758-7590C99B5E42" + "criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E2BC4CCE-2774-463E-82EA-36CD442D3A7B" + "criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C478024C-2FCD-463F-A75E-E04660AA9DF1" + "criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", + "matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F" + "criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "1851ADE5-C70C-46E0-941A-6ADF7DB5C126" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "69DA3BA2-AF53-4C9D-93FA-0317841595B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "67B59D6A-7EDA-4C34-81D6-C2557C85D164" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AEBA40B6-8FDF-41AA-8166-F491FF7F3118" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "E74E2B72-A428-4BB3-B6F8-0AF5E487A807" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "945FF149-3446-4905-BCA1-C397E3497B58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "8E446DBD-FEFA-4D22-9C9D-51F61C01E414" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "3C8DE728-78E1-4F9F-BC56-CD9B10E61287" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "80E31CC6-9356-4BB7-9F49-320AAF341E1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "4B3E7199-8FB7-4930-9C0A-A36A698940B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EDBEC461-D553-41B7-8D85-20B6A933C21C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "78BAA18C-E5A0-4210-B64B-709BBFF31EEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*", - "matchCriteriaId": "419867C6-37BE-43B4-BFE0-6325FEE3807D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*", - "matchCriteriaId": "37896E87-95C2-4039-8362-BC03B1C56706" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "13A159B4-B847-47DE-B7F8-89384E6C551B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "57B59616-A309-40B4-94B1-50A7BC00E35C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*", - "matchCriteriaId": "8667FBC6-04B6-40E5-93B3-6C22BEED4B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F39A1B1-416E-4436-8007-733B66904A14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "FC2E5F96-66D2-4F99-A74D-6A2305EE218E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2D724D09-0D45-4701-93C9-348301217C8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*", - "matchCriteriaId": "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*", - "matchCriteriaId": "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*", - "matchCriteriaId": "6E36203C-1392-49BB-AE7E-49626963D673" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6713614A-B14E-4A85-BF89-ED780068FC68" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FD95F8EB-B428-4B3C-9254-A5DECE03A989" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "069EB7EE-06B9-454F-9007-8DE5DCA33C53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*", - "matchCriteriaId": "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "18BF5BE6-09EA-45AD-93BF-2BEF1742534E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EC1460DF-1687-4314-BF1A-01290B20302D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "470380B0-3982-48FC-871B-C8B43C81900D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "63190D9B-7958-4B93-87C6-E7D5A572F6DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4AAF4586-74FF-47C6-864B-656FDF3F33D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5652D5B0-68E4-4239-B9B7-599AFCF4C53E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "57B71BB7-5239-4860-9100-8CABC3992D8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "E3797AB5-9E49-4251-A212-B6E5D9996764" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "20C0BD87-CE4B-49D2-89BE-EF282C43AD72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C3E6C4A8-59F4-43EE-8413-E95289037598" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FE76357A-27E6-4D85-9AA0-1BB658C41568" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C56C5FDB-24E2-479D-87CA-164CD28567D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019" + "criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4" } ] } @@ -398,79 +170,140 @@ "references": [ { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "URL Repurposed" + ] }, { "url": "http://marc.info/?l=bugtraq&m=108981780109154&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=108982983426031&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=109051444105182&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=109181600614477&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2004/dsa-531", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2005/dsa-669", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2004_21_php4.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-392.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-395.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-405.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-816.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/10725", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.trustix.org/errata/2004/0039/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16693", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json b/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json index 0831fc2f8f0..33a80361ee7 100644 --- a/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json +++ b/CVE-2004/CVE-2004-21xx/CVE-2004-2154.json @@ -2,8 +2,8 @@ "id": "CVE-2004-2154", "sourceIdentifier": "secalert@redhat.com", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-10-11T01:29:46.857", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:17:54.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -58,103 +80,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "68BD578F-CCAD-4515-9205-EB4F297C6DB4" + "criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.21", + "matchCriteriaId": "5F835149-D8DC-4086-8A1A-6DA6F0B1641F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", - "matchCriteriaId": "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3" - }, + "criteria": "cpe:2.3:a:apple:cups:1.1.21:-:*:*:*:*:*:*", + "matchCriteriaId": "1AE87AA4-1F4C-46CC-8365-6390B5E9C2D7" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "734D0C2C-F71F-461A-87EE-202C6B706753" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F0F402D-5CD0-4477-8B59-C753CECB02BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", - "matchCriteriaId": "959F7AFA-ED20-434C-993F-06C2A8574662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", - "matchCriteriaId": "D4F5A0A4-2884-46CA-A846-8B954EB80CFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35E65857-12C7-49DE-AD27-3CACD456231C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "47CEF035-57A6-470B-916A-E5562C28E866" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", - "matchCriteriaId": "4E26BB15-4CF8-4496-A7F7-EB34C444EF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "D414984E-4F6B-4278-8346-968587E4B18E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", - "matchCriteriaId": "33C36DCB-2FDD-44E6-85E8-875575AAE69E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7C4B7C23-0C54-4FBA-A774-9CC1E148376E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", - "matchCriteriaId": "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", - "matchCriteriaId": "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", - "matchCriteriaId": "A786A770-919E-4E23-949D-D836F316618A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", - "matchCriteriaId": "00A2249C-73DE-434E-A41F-4EDB0ADC0845" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", - "matchCriteriaId": "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FB7653F1-70E2-423F-A6A9-30333644B506" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "778A6957-455B-420A-BAAF-E7F88FF4FB1E" } ] } @@ -166,35 +114,52 @@ "url": "http://www.cups.org/str.php?L700", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://www.novell.com/linux/security/advisories/2005_18_sr.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-571.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.ubuntu.com/usn/usn-185-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162405", "source": "secalert@redhat.com", "tags": [ + "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163274", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9940", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-40xx/CVE-2006-4095.json b/CVE-2006/CVE-2006-40xx/CVE-2006-4095.json index 021e258943f..ad0540f6b07 100644 --- a/CVE-2006/CVE-2006-40xx/CVE-2006-4095.json +++ b/CVE-2006/CVE-2006-40xx/CVE-2006-4095.json @@ -2,8 +2,8 @@ "id": "CVE-2006-4095", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-06T00:04:00.000", - "lastModified": "2018-10-17T21:33:21.160", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:04:44.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -22,6 +22,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -55,7 +77,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-617" } ] } @@ -69,43 +91,77 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F" + "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.2.6", + "matchCriteriaId": "862B3924-FB12-4851-A647-74F563ED2DA5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D43375C5-0736-43DE-99B5-B75719D0AD0F" + "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndIncluding": "9.3.2", + "matchCriteriaId": "E4696610-EF54-47D8-AC5E-D7251EA40DD5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", + "matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E4360536-0BA6-41DB-AA87-45AFB51562CD" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*", + "matchCriteriaId": "0FA3A32E-445A-4D39-A8D5-75F5370AD23D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "438AEC8C-DD71-4A25-9E9D-A89415F7EC83" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", + "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.3.9", + "matchCriteriaId": "6CE37418-3D19-483A-9ADE-2E38272A4ACC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA93166-513D-40AA-9855-FC89060BA03C" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.4.0", + "versionEndExcluding": "10.4.9", + "matchCriteriaId": "C2B4D4BA-89EB-4D02-AC3E-D451CC45395F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "847C1017-F964-4A33-BEA8-DDB202DD0FB6" + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.3.9", + "matchCriteriaId": "3E9A9D63-EEA1-4289-8382-6CC91D2241A1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "92F95086-3107-4C38-BB3B-7BABA9BD15C3" + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.4.0", + "versionEndExcluding": "10.4.9", + "matchCriteriaId": "AD69D222-8B01-4944-A459-D3FFDCA6BBC0" } ] } @@ -115,102 +171,258 @@ "references": [ { "url": "http://docs.info.apple.com/article.html?artnum=305530", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/21752", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21786", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21816", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21818", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21828", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21835", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21838", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21912", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/21926", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22298", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/24950", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/25402", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200609-11.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1016794", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/915404", "source": "cve@mitre.org", "tags": [ "Patch", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:163", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_24_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openbsd.org/errata.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/445600/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/19859", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-343-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.us.debian.org/security/2006/dsa-1172", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/3473", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/1401", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/1939", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28745", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-626", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-44xx/CVE-2006-4434.json b/CVE-2006/CVE-2006-44xx/CVE-2006-4434.json index fd4a225c99a..74f30271177 100644 --- a/CVE-2006/CVE-2006-44xx/CVE-2006-4434.json +++ b/CVE-2006/CVE-2006-44xx/CVE-2006-4434.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4434", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-29T00:04:00.000", - "lastModified": "2011-03-10T05:00:00.000", + "lastModified": "2024-02-15T21:20:06.930", "vulnStatus": "Analyzed", "descriptions": [ { @@ -22,6 +22,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -55,7 +77,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-416" } ] } @@ -69,218 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EE4E6D5E-BD37-4F8E-962C-0438C62BEF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:4.55:*:*:*:*:*:*:*", - "matchCriteriaId": "111C0FC5-A199-44CA-9512-9E6B12514E42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*", - "matchCriteriaId": "5DFC5B8B-9102-46A9-9BD3-5CC0B671383F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*", - "matchCriteriaId": "51BC02ED-17B1-44B3-97DB-F626A2BD2524" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*", - "matchCriteriaId": "EF58EBCB-5735-4569-957D-C37CC38F0823" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B754AD41-90A0-4382-B599-E41289C690A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*", - "matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*", - "matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*", - "matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*", - "matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*", - "matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*", - "matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*", - "matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*", - "matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*", - "matchCriteriaId": "7B82BBB7-CD72-4A33-97D4-B1E51A595323" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*", - "matchCriteriaId": "6C1D6A40-5DD1-481C-AF85-85705FCE3680" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC7125C4-64AF-4A3B-BBD6-1A56660A2D90" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*", - "matchCriteriaId": "83AE5BA5-09FF-4AF8-B4E8-4D372A208E2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D20FAC60-445E-4847-B5DE-8ACDDA55E1CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*", - "matchCriteriaId": "9962F81C-A08C-4F8E-A07C-4F4B5C441EA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A38C234D-EF75-4A96-A0FD-E1DDDADAC1BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:*", - "matchCriteriaId": "ADED21E7-6DBC-4846-BF52-FE11A3D8A361" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:*", - "matchCriteriaId": "CD501A5A-E602-4847-8178-E9CC289AD41C" + "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.13.8", + "matchCriteriaId": "59AD875A-87DA-43B2-87DB-DD7993118276" } ] } @@ -288,59 +101,144 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/21637", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21641", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21696", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21700", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21749", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22369", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://securitytracker.com/id?1016753", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.debian.org/security/2006/dsa-1164", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openbsd.org/errata.html#sendmail3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.openbsd.org/errata38.html#sendmail3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/28193", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/19714", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.sendmail.org/releases/8.13.8.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Release Notes" ] }, { "url": "http://www.vupen.com/english/advisories/2006/3393", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -348,6 +246,7 @@ "url": "http://www.vupen.com/english/advisories/2006/3994", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2006/CVE-2006-45xx/CVE-2006-4574.json b/CVE-2006/CVE-2006-45xx/CVE-2006-4574.json index a5eb7500014..b679025e9d7 100644 --- a/CVE-2006/CVE-2006-45xx/CVE-2006-4574.json +++ b/CVE-2006/CVE-2006-45xx/CVE-2006-4574.json @@ -2,8 +2,8 @@ "id": "CVE-2006-4574", "sourceIdentifier": "secalert@redhat.com", "published": "2006-10-28T00:07:00.000", - "lastModified": "2018-10-17T21:38:07.510", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:20:15.563", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,11 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" + }, + { + "lang": "en", + "value": "CWE-617" } ] } @@ -62,53 +88,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9053B950-143E-4941-9C58-A57D9F1FF78D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.8.16:*:*:*:*:*:*:*", - "matchCriteriaId": "8FD279A0-5BA7-4D86-B975-2E76B4B2D85B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "41535173-00D3-4E52-9441-D7ED44BE9B05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "589FBD3D-FFE4-4BB3-B5F9-7FF949212AE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "BD4F19A6-98D5-4B6A-8AF0-D88561D50296" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "B6D5E65C-08BF-480D-A7BE-1876E9AC93E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*", - "matchCriteriaId": "503E7F73-0E2A-442C-9B76-679A2AD03052" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E3C422E5-3252-48C2-B4FF-E32AA5463D97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", - "matchCriteriaId": "31C43A78-E578-4B1C-8E33-24529E973E30" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A0D56DA6-3EB2-4074-8C43-A5FD93B1555B" + "criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.10.1", + "versionEndIncluding": "0.99.3", + "matchCriteriaId": "4D0290BD-E0AE-4DC5-BE29-D8B9A25309CB" } ] } @@ -118,59 +101,165 @@ "references": [ { "url": "ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22590", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22659", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22672", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22692", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22797", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22841", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/22929", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/23096", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1017129", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:195", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_65_ethereal.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0726.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/450307/100/0/threaded", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/20762", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us.debian.org/security/2006/dsa-1201", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/4220", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.wireshark.org/security/wnpa-sec-2006-03.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29844", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-746", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-55xx/CVE-2007-5544.json b/CVE-2007/CVE-2007-55xx/CVE-2007-5544.json index 18a12f4c178..0843dec3644 100644 --- a/CVE-2007/CVE-2007-55xx/CVE-2007-5544.json +++ b/CVE-2007/CVE-2007-55xx/CVE-2007-5544.json @@ -2,8 +2,8 @@ "id": "CVE-2007-5544", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-29T21:46:00.000", - "lastModified": "2011-03-08T03:00:53.407", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:33:30.423", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-732" } ] } @@ -62,33 +84,26 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C709D66D-3AE7-48B7-9E27-5D1FE452643C" + "criteria": "cpe:2.3:a:ibm:lotus_domino:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.5", + "matchCriteriaId": "ED2E3AB3-15AF-42F8-9AAC-8A7D3C553474" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:fp1:*:*:*:*:*", - "matchCriteriaId": "7B0B5F96-0762-45D3-B13E-1E4ED04AD69D" + "criteria": "cpe:2.3:a:ibm:lotus_domino:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndExcluding": "7.0.2", + "matchCriteriaId": "34C250E2-C8A3-4160-85E2-5DAFADFC2507" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:fp2:*:*:*:*:*", - "matchCriteriaId": "DB1EA406-6488-46C0-B857-0BFFAA65B258" + "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:-:*:*:*:*:*:*", + "matchCriteriaId": "6ADFA292-0E8C-489E-9D97-99996D3EB626" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8FDDB5FD-9152-4A9C-829B-8BA2ACB3A5A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A8A7AF44-125F-4760-8370-34B7B4CB8753" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "69495B18-39A4-443F-A724-F713C4DD14A2" + "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "EF980FE0-9048-4EB3-A520-462C9419EFF6" }, { "vulnerable": true, @@ -98,18 +113,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "957BA698-9D48-4906-9FF3-584927C978B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "94646433-DE15-4214-9C78-7D1DAB5A12D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3449A490-865A-4262-8482-429DEF455644" + "criteria": "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.3", + "matchCriteriaId": "A30DAD9B-D09E-4011-A7B2-8F1E401DFE5F" } ] } @@ -117,24 +124,45 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/27321", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257030", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, { "url": "http://www.securityfocus.com/bid/26146", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-013.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/3598", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-10xx/CVE-2009-1073.json b/CVE-2009/CVE-2009-10xx/CVE-2009-1073.json index c26f1ada3c9..c7e029e7bd7 100644 --- a/CVE-2009/CVE-2009-10xx/CVE-2009-1073.json +++ b/CVE-2009/CVE-2009-10xx/CVE-2009-1073.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1073", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-31T18:24:45.953", - "lastModified": "2009-04-08T05:36:53.500", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:31:04.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-732" } ] } @@ -63,78 +85,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:debian:nss-ldap:*:*:*:*:*:*:*:*", - "versionEndIncluding": "0.6.7", - "matchCriteriaId": "DB943F53-F658-44C7-B873-B21129233271" - }, + "versionEndExcluding": "0.6.8", + "matchCriteriaId": "C3B17F2C-7A87-4AFC-AA24-5D2F2B4C787F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9D924092-07D7-4C20-A796-3CB3188B2F0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7B7147BE-A2F9-4624-AF69-75418C10EB9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "355A69B0-3A7C-41FD-BD83-7D4A038EA604" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B31273EF-3D69-404B-86A6-766235EFBEA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7A6D6525-A15C-4269-BAB3-9D0CF5B71F23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "46B21B17-2CE8-45D6-8E87-8DAF87F4A72E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9E9FBE5B-A552-498F-A7A9-75E921251F69" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "45FF80F0-B083-44E5-AE45-286F8A72FF97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2C4FD7D7-4033-4EDF-AF0C-DCE5489DE8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2FE2FBA0-6E94-4D8A-80E0-5D195622E69F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "424198C2-8CE1-4A38-91E7-75347F1EC258" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "036082D2-A5D1-4B64-BA1F-D4ECB82AC472" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C2EC31E2-720E-4C38-AB4C-D5AB87EA9734" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:debian:nss-ldap:0.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD88B40-E630-4D0E-A9CF-3DFCEAB09D03" + "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" } ] } @@ -146,54 +113,90 @@ "url": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/debian/libnss-ldapd.postinst?r1=795&r2=813", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] }, { "url": "http://arthurenhella.demon.nl/viewvc/nss-ldapd/nss-ldapd/man/nss-ldapd.conf.5.xml?r1=805&r2=806", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520476", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Patch" ] }, { "url": "http://ch.tudelft.nl/~arthur/nss-ldapd/news.html#20090322", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://launchpad.net/bugs/cve/2009-1073", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/34523", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1758", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/03/23/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/03/24/2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/03/25/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/03/25/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/34211", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json b/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json index 61f46e71958..fe9499ba114 100644 --- a/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json +++ b/CVE-2009/CVE-2009-20xx/CVE-2009-2054.json @@ -2,8 +2,8 @@ "id": "CVE-2009-2054", "sourceIdentifier": "ykramarz@cisco.com", "published": "2009-08-27T17:00:01.047", - "lastModified": "2009-09-02T05:23:46.967", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:15:40.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-770" } ] } @@ -62,513 +62,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:business:*:*:*:*:*", - "matchCriteriaId": "0B9151D5-00FC-4E8D-B5E8-6A5B8599FF3B" + "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "5.1\\(3g\\)", + "matchCriteriaId": "4C7C8DA6-9BAD-4ECB-8901-F1527C8710D5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:\\(1\\):*:*:*:*:*:*:*", - "matchCriteriaId": "79A1DD14-FB18-468B-948E-107CAEA4EBEB" + "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1\\(4\\)", + "matchCriteriaId": "8E11B055-9625-4A00-8252-6E1660037F12" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:\\(2\\):*:*:*:*:*:*:*", - "matchCriteriaId": "E34261EC-F5DD-4AE3-BFED-CCD6DBE63E12" + "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndExcluding": "7.0\\(2a\\)su1", + "matchCriteriaId": "906EED24-1D35-4952-AFCA-D7D5223F66D3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:\\(2b\\):*:*:*:*:*:*:*", - "matchCriteriaId": "D5445967-D487-4B66-9DCA-E42277E8284A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*", - "matchCriteriaId": "9B9DA1F8-FA05-4380-8EFF-AF9FEF18FF2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "65BB9155-89E5-4D54-AF1B-D5CA38392D5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*", - "matchCriteriaId": "2A76CD6B-0C24-4F5F-B4BB-BA114150A7F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1E29A61E-334B-4F95-9B47-8F53A4DB3EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr.5:*:*:*:*:*:*", - "matchCriteriaId": "FBE07ABF-97B2-48B4-8EF6-861AB41340F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr4:*:*:*:*:*:*", - "matchCriteriaId": "9135D3DE-5110-47CB-A23F-7CE3D9AFD153" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5:*:*:*:*:*:*", - "matchCriteriaId": "914A2B2A-6292-451B-B26A-1B529CECBE3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5b:*:*:*:*:*:*", - "matchCriteriaId": "72FAE8F7-504A-4B6F-9C9D-45158AC6C208" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:\\(3\\)sr5c:*:*:*:*:*:*", - "matchCriteriaId": "835DD627-C5F1-4733-8949-C91592EC719A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*", - "matchCriteriaId": "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "DFFD96E3-B19F-41B7-86FD-DBFD41382C28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*", - "matchCriteriaId": "0E9BF838-87A2-43B8-975B-524D7F954BF5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*", - "matchCriteriaId": "9600EA23-5428-4312-A38E-480E3C3228BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*", - "matchCriteriaId": "57F5547E-F9C8-4F9C-96A1-563A66EE8D48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0467A78A-8449-4012-BD80-86BAF8376B8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "363E750B-4BC1-4A4B-8440-1617BEF9D8A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B44AB103-60E6-4FAF-BD7C-54365E30C88A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2\\(3\\)sr.2:*:*:*:*:*:*", - "matchCriteriaId": "701A374B-00A7-4151-8652-9A39FAECBC5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr2b:*:*:*:*:*:*", - "matchCriteriaId": "42F41FF1-3FD1-4E90-877C-AC10D56CFEA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:4.2_\\(3\\)sr3:*:*:*:*:*:*", - "matchCriteriaId": "291CFDEC-CDF8-438D-9D1E-2832CE705FB6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "0B9DCB59-F6AD-4CBD-B746-8FBA4BF733CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr2b:*:*:*:*:*:*:*", - "matchCriteriaId": "F3E094AB-5F10-4238-BBE3-236B7306C995" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr3:*:*:*:*:*:*:*", - "matchCriteriaId": "2496F01D-E387-48CD-B586-826D284BBC2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr4:*:*:*:*:*:*:*", - "matchCriteriaId": "B5955E35-E200-4054-8757-39BD04F13220" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BC830649-C0D4-4FFC-8701-80FB4A706F58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "935D2815-7146-4125-BDBE-BFAA62A88EC9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3_sr3:*:*:*:*:*:*:*", - "matchCriteriaId": "55FCD7DD-A979-4B35-8C9C-5DAA340D2AEA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*", - "matchCriteriaId": "19432E5E-EA68-4B7A-8B99-DEBACBC3F160" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*", - "matchCriteriaId": "ABE4CD8E-F27C-4F96-B955-FC1E71B5D55B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_1:*:*:*:*:*:*:*", - "matchCriteriaId": "E837527C-D5FA-479F-A61B-8667972FC594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_2:*:*:*:*:*:*:*", - "matchCriteriaId": "488023AF-EA56-40E2-9A23-61EA758180D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3:*:*:*:*:*:*:*", - "matchCriteriaId": "D9E1D151-8031-447A-9CB9-871599404339" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3_sr2:*:*:*:*:*:*:*", - "matchCriteriaId": "5ED2283C-822A-45B1-B82B-90EEB78CD372" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3_sr2b:*:*:*:*:*:*:*", - "matchCriteriaId": "A6A6AC6B-D3CD-4F05-A73F-61041C6DB514" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3_sr3:*:*:*:*:*:*:*", - "matchCriteriaId": "939CD685-4539-421F-BC12-36E641301E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2_3sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "5C48DC30-8F7D-4448-9C42-3CBC25053C99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:4.3\\(1\\)sr.1:*:*:*:*:*:*", - "matchCriteriaId": "25EF5BF5-5909-4194-96DD-E8725BD3499A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\):*:*:*:*:*:*:*", - "matchCriteriaId": "8F1DEC3B-2782-4144-9651-73116294765D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\)sr.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A459F3A2-817B-4F7F-AF9B-4EACB90B7DF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\):*:*:*:*:*:*:*", - "matchCriteriaId": "0BB09252-6C59-4E1C-93C8-0AC3ED54A294" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\)sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "CA0F270A-F953-43C7-9358-3B237B355BB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0DCCDC7F-5326-4B6B-9B6F-DAD43E51CD76" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3B6E4272-6FDA-4C49-8F4A-C234041C0DD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3_1:*:*:*:*:*:*:*", - "matchCriteriaId": "7F524EFB-C076-4EA2-8BF7-9A1B21036CBB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3_1_sr1:*:*:*:*:*:*:*", - "matchCriteriaId": "97DC0190-A028-489D-BF61-8A49A91C15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AF68FA-433F-46F2-B309-B60A108BECFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_1:*:*:*:*:*:*:*", - "matchCriteriaId": "CFE62DB5-943D-43B5-BD13-D74DAA122578" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_2:*:*:*:*:*:*:*", - "matchCriteriaId": "D2D76BC6-1A59-4D74-A7C9-8C05D96E01F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_3:*:*:*:*:*:*:*", - "matchCriteriaId": "788BDB54-0970-468F-9713-14B097E1A863" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_3a:*:*:*:*:*:*:*", - "matchCriteriaId": "3CAE1371-F46C-4DFD-A4A4-D609E93C4740" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4:*:*:*:*:*:*:*", - "matchCriteriaId": "E7AC2F39-C029-4FAB-A963-0C7F1D5A8067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4a:*:*:*:*:*:*:*", - "matchCriteriaId": "62781360-15FC-4E40-AEF8-BF01606A671B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0_4a_su1:*:*:*:*:*:*:*", - "matchCriteriaId": "08E03DCC-4DCB-4830-943F-05F7E3BB49EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "640BFEE2-B364-411E-B641-7471B88ED7CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(1\\):*:*:*:*:*:*", - "matchCriteriaId": "B860F1E1-E295-4B71-B396-14286611EA36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2\\):*:*:*:*:*:*", - "matchCriteriaId": "E194E6EC-282D-4C8E-96E3-00D64FCD8C6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2a\\):*:*:*:*:*:*", - "matchCriteriaId": "5B2EA451-EE18-440A-924A-556A2EC74300" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(2b\\):*:*:*:*:*:*", - "matchCriteriaId": "8950C510-38F3-4040-8871-C085DDECF5B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:\\(3a\\):*:*:*:*:*:*", - "matchCriteriaId": "7101A008-3F3C-4ABB-B4FC-25BDA8809C87" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:5.1\\(1\\):*:*:*:*:*:*", - "matchCriteriaId": "CDEF7B2B-66CB-4C92-B678-859693C8C890" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1:5.1_\\(2a\\):*:*:*:*:*:*", - "matchCriteriaId": "8AA0378D-5EE0-4BD6-BB33-7DF01F830DDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(1\\):*:*:*:*:*:*:*", - "matchCriteriaId": "1B9FDFF3-2E60-4E41-9251-93283D945D94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2\\):*:*:*:*:*:*:*", - "matchCriteriaId": "239510AD-8BB0-4515-B1DA-80DE696D25DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2a\\):*:*:*:*:*:*:*", - "matchCriteriaId": "26277C4A-4E27-492C-B18C-AC68D86ADF55" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2b\\):*:*:*:*:*:*:*", - "matchCriteriaId": "9003EC1A-6E85-41F1-BB5D-B841C9C28105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3\\):*:*:*:*:*:*:*", - "matchCriteriaId": "0318CF61-B892-4D44-B41A-D630B4AB808C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3a\\):*:*:*:*:*:*:*", - "matchCriteriaId": "9CDA8A78-BA6C-4451-8EAA-B83C3A6C6BA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3c\\):*:*:*:*:*:*:*", - "matchCriteriaId": "84A49932-1E22-4BE0-8195-926D44F65AAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3d\\):*:*:*:*:*:*:*", - "matchCriteriaId": "4DE1B0DD-EA64-493B-86B7-9057EE5033C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9E51D8BF-12BB-4DD1-9232-1D066889B30F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_\\(2a\\):*:*:*:*:*:*:*", - "matchCriteriaId": "AD2935E2-7340-4B49-8B5D-C7801FD605C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_1:*:*:*:*:*:*:*", - "matchCriteriaId": "2740B5E5-E8D2-491E-B174-A1A9DF812418" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_2:*:*:*:*:*:*:*", - "matchCriteriaId": "60D93DAA-0ED6-4DA5-B7A5-50D5567A6178" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_2a:*:*:*:*:*:*:*", - "matchCriteriaId": "DEA1ABD3-D076-4CA6-A12D-3C3BB5080B1D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_2b:*:*:*:*:*:*:*", - "matchCriteriaId": "54B14EC5-4391-4698-BF6F-2726FD28D318" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1_3a:*:*:*:*:*:*:*", - "matchCriteriaId": "B5F1270F-DBF6-4938-A1A0-732EE52C83E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:\\(1\\):*:*:*:*:*:*", - "matchCriteriaId": "156F822A-08CB-4EE2-9054-18F649D96C39" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:\\(1a\\):*:*:*:*:*:*", - "matchCriteriaId": "53CBD1E5-46C6-4F31-867A-118227EB0473" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*", - "matchCriteriaId": "C2DF1139-A161-48DD-9929-F6939D626461" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*", - "matchCriteriaId": "FF99088E-1330-4E15-8BD3-2A5172FBA460" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0_1:*:*:*:*:*:*:*", - "matchCriteriaId": "05F443F9-B454-42B3-8464-ACEA40066DF5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0_1a:*:*:*:*:*:*:*", - "matchCriteriaId": "1FBF1FDC-7096-4EE6-B9A2-0C9971F407D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6BC6EF34-D23D-45CA-A907-A47993CC061E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:\\(1a\\):*:*:*:*:*:*", - "matchCriteriaId": "8E8F77F9-05C3-4B66-9022-7B227F97978C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*", - "matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*", - "matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*", - "matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*", - "matchCriteriaId": "3C2B7439-8547-41A6-AE6C-6ABCD167890E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*", - "matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "42F3870B-5DE9-4E3E-BEA7-863916DD45DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1_1a:*:*:*:*:*:*:*", - "matchCriteriaId": "047E45A0-C0F0-4900-B5FB-8F0A5852732D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6F2564A8-5805-46E0-B6EC-F4967D67C566" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\):*:*:*:*:*:*:*", - "matchCriteriaId": "D0907FAF-8334-42C1-B35A-EC6ED89AC110" + "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1", + "versionEndExcluding": "7.1\\(2a\\)su1", + "matchCriteriaId": "307FB584-44E5-4A1C-B219-E438D9C0CF5C" } ] } @@ -576,21 +94,53 @@ } ], "references": [ + { + "url": "http://osvdb.org/57456", + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36498", + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36499", + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml", "source": "ykramarz@cisco.com", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/36152", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1022775", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-27xx/CVE-2009-2726.json b/CVE-2009/CVE-2009-27xx/CVE-2009-2726.json index 4a9941649fd..e4b614bac27 100644 --- a/CVE-2009/CVE-2009-27xx/CVE-2009-2726.json +++ b/CVE-2009/CVE-2009-27xx/CVE-2009-2726.json @@ -2,8 +2,8 @@ "id": "CVE-2009-2726", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-12T10:30:01.110", - "lastModified": "2018-10-10T19:42:05.157", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:05:21.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-770" } ] } @@ -62,763 +62,90 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:business_edition:b.1.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8086337E-5020-43E7-9BAB-62AA22A354AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:business_edition:c.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "30C6D2DE-1F8F-4319-B254-D35E71083220" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:business_edition:c.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "17D78AA8-AF67-4343-A9B0-EFC63D8CC4BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9F7971E1-F136-4ADC-95EC-BC4F92E838CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "E62D108C-862D-4BDB-BE37-285AA4C9C59A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "CF1422F3-829D-498C-83A6-02989DFB70A7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "CBEB9D69-A404-4053-92F9-CAC3481AFF1B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "E816CCDB-4169-4F09-AE87-E467F4BE7685" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27202966-2C41-4964-9497-1887D2A834C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1471B5A2-15BE-4E7C-BA49-2E6002F7C8EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*", - "matchCriteriaId": "65223182-1675-462C-AF67-4A48760A63F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7108D72F-5AFD-4EEF-B2A9-CA4FA792E193" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*", - "matchCriteriaId": "DC7EB4CD-6436-4E0B-A620-9DF2AC8A3C66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "107DA2D8-FE7C-4B70-856D-43D58B988694" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.4:netsec:*:*:*:*:*:*", - "matchCriteriaId": "02D5E6DF-7C9C-479F-986B-D5C8A144ACB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "ABD71DD9-8A15-45E2-9FB3-F0544D7E1B80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.5:netsec:*:*:*:*:*:*", - "matchCriteriaId": "68AF6200-1385-449F-A00E-2BACEE16450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5C14614F-4E27-40A6-9E56-2B1DBB10330B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.6:netsec:*:*:*:*:*:*", - "matchCriteriaId": "61C0769F-6739-41D2-ADD8-924AC04C5F28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "7A2F2F5A-66FD-4057-917C-66332A88D83E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7:netsec:*:*:*:*:*:*", - "matchCriteriaId": "8EF13987-5767-4FED-9584-63D74B0A30A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "399B0206-B48B-46EF-8CA6-A6E5A2550B25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.7.1:netsec:*:*:*:*:*:*", - "matchCriteriaId": "C57C1324-E11A-4B2B-9722-A4A63AEF0497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "26E9760F-C0EB-47BB-8DA4-CC7815099DAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.8:netsec:*:*:*:*:*:*", - "matchCriteriaId": "EE6D9718-D57D-48F6-A2B1-CECAFFCDDFB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6BD915CD-A7D3-4305-A6C0-290C648A226C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.9.1:netsec:*:*:*:*:*:*", - "matchCriteriaId": "3249AB40-2058-42E9-9A33-64E434E5BB64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "9E79CCE5-C29B-4726-8D2F-BC20F70959BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*", - "matchCriteriaId": "0CF6584D-A7BB-4BD5-8232-9293FEE4A971" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "F29C13DB-6F04-4B41-90A2-2408D70F3641" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*", - "matchCriteriaId": "174D6B56-7D0F-46F0-849A-FD05CB348FAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0F4F734E-0E78-4957-B323-8E9FBA7FF15C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*", - "matchCriteriaId": "938F545A-F8A7-455E-8E5A-2B5454B6CE53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1A4B117B-E945-4033-A79D-10DFAA3DF18B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*", - "matchCriteriaId": "E7C0897A-C841-4AAB-A6B3-1FCF7A99A60A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "EA6D866F-8189-4FFD-AA24-47C0A015C246" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*", - "matchCriteriaId": "B2BAA1B3-7DD3-4248-915D-2BCC0ACFA2C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*", - "matchCriteriaId": "21612C17-7368-4108-B55B-5AB5CA6733E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E1028E-2C07-4BA3-B891-FA853A87B280" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*", - "matchCriteriaId": "8A0D57D7-15AD-4CDF-A5A7-AB83F8E6154E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "9E74F577-70BD-4FAF-BCFD-10CD21FC5601" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*", - "matchCriteriaId": "06DB25C8-4EA5-465F-8EFA-BCA8D40F1795" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "57BB03E2-E61C-4A94-82DF-8720698CE271" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*", - "matchCriteriaId": "A149F8C2-3DA5-44B2-A288-3482F3975824" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "1B30A36F-5CE6-4246-8752-176FB5999C1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*", - "matchCriteriaId": "9462B320-B69D-409D-8DCC-D8D6CA1A757D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "E0F76DFD-4DAC-4B02-8967-B242CDEEF6C9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*", - "matchCriteriaId": "ECCCBAE9-8FD4-43F0-9EF8-56E9BBA3D8C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "6A59BC20-3217-4584-9196-D1CD9E0D6B52" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*", - "matchCriteriaId": "BEA0014A-659B-4533-A393-6D4ADC80EB0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "56F728BA-FC9E-4EEE-9A08-C9C7433BD8D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*", - "matchCriteriaId": "8F1621F9-7C84-4CF0-BBCD-CEAEE8683BAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3C64DF29-5B3D-401E-885E-8E37FD577254" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*", - "matchCriteriaId": "346C9F65-B5FB-4A75-8E1B-137112F270D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7BF52A-2FF8-40ED-B757-28A1101DE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*", - "matchCriteriaId": "7EFEE380-0C64-4413-AF3A-45ABC8833500" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "7A321C2D-852B-4498-ADD6-79956410AB94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*", - "matchCriteriaId": "8CA18FC6-1480-400E-A885-8CDAE45AA7A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9D5F0DCF-C6A2-4A09-90C9-D70F174FDEF5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*", - "matchCriteriaId": "93741261-378B-4C02-8D68-0E5F39128375" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C820538E-14EC-43C1-80DB-6AAE4905EF0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*", - "matchCriteriaId": "07CF9DD6-B624-49F0-A8E4-7EBCE7932BEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "E9562112-2505-4F78-86DE-F30EFAEE47D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*", - "matchCriteriaId": "9EEA1E9C-C1FB-4EFD-86EA-DCF78C57FC35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6D8FD0-C8C1-4868-9AF1-96B1949C18AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*", - "matchCriteriaId": "5E20FAF7-9031-478E-A89C-D6FB3B5FDE3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", - "matchCriteriaId": "72A840B4-216B-4063-997F-791FBC8C8658" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*", - "matchCriteriaId": "72375576-F857-4585-A677-A326D89A65B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "BE47A547-26E7-48F9-B0A6-2F65E04A1EDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "E1AEB744-FCF2-4A41-8866-9D1D20E6C6B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "51E5EB34-30AD-4E81-8BD4-4AB905E52B82" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "4359322B-08D0-4710-A9C3-54BD4A17B800" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.2:*:*:*:*:*:*:*", - "matchCriteriaId": "78F84DF4-DBA7-430C-AF17-F52024EF80D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.3:*:*:*:*:*:*:*", - "matchCriteriaId": "34266614-3588-485C-A609-37823F8499AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.2.30.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DD299B8E-D912-4B67-85C3-79CFF4C4F3E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "967DF432-DEF4-4FA2-8C8D-19A7FB663A33" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "40850BF4-E252-4667-9B46-9B6FEF6E997D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*", - "matchCriteriaId": "1BB01DD1-B29B-4210-88CC-9ADB3148A410" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*", - "matchCriteriaId": "5C0FA6A3-BFA9-4397-B75B-75C8357C36B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "295D4042-2D3C-481B-B969-2DDAC1161198" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "99E9EE2A-56AD-42BC-8CB0-D34091849B0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "96877A3E-B54B-4F31-B281-76CDC98B2D02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "6D0B4503-42A6-4D88-954E-A662E91EC204" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A4B73813-BCD8-429E-B9B9-D6665E026BC5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5BBA3ECC-4F40-41CD-A6D7-BBD680DDBACC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9CBE2156-AF86-4C72-B33D-3FF83930F828" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "61408884-FBBF-4D94-A552-F99AB46DCED6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "4A527277-D97D-4B74-906F-7481BDBD96D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D8B57A32-7B83-4783-A244-C26301970444" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "044FD0D0-FC92-4A01-B0D4-11A703EF21FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3477EC1A-9634-492C-B052-35770A9C9F4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "1C90F104-FA2C-4091-B149-1774AC982C0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "C9328768-7C08-4143-B5F8-F5C2D735D21A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6C04E2B3-094B-4828-A2FC-BB66244A9F73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "4BDE3D31-4BB2-45A3-B085-8C91152A3152" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "CE0107D4-395E-45F1-B963-7618CCC007D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "53B8E11B-4984-45A8-A107-D276205988B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "2495DB98-F923-4E60-86EC-2DBB7A98C90C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E186D125-996E-4900-A2B8-5CDC8B5D5136" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27DC6CF7-4DF8-4472-A684-8CCB5E26FCFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "88576385-EF03-408B-9775-B52E6AFFE48A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "1A838577-2BA1-4792-8B69-6FB07FFD7727" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CDEED3E1-13E0-46E6-8AAB-D24D2D04AE4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "ED2BF36F-CF10-4F24-970B-3D0BB7561C81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc-2:*:*:*:*:*:*", - "matchCriteriaId": "D35DD57B-EF77-4C5F-9B44-DAF5E0560E22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BFC1BB05-15C6-4829-86EB-5B1BFA4B5B17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*", - "matchCriteriaId": "AB77E88B-7233-4979-914E-24E671C1FB23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C4FF0F09-0268-480F-A2F3-6F8C3F323EEB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*", - "matchCriteriaId": "1CCF9CAE-674A-4833-9D5C-FCBD865BE9F6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FB1593E1-BF21-4DB9-A18E-9F221F3F9022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19.2:*:*:*:*:*:*:*", - "matchCriteriaId": "EC8E9FE3-FA25-4054-876E-4A3CE6E71AFF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.19_rc3:*:*:*:*:*:*:*", - "matchCriteriaId": "2D41604A-21CB-4EF3-85E8-8CD170C8013F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "4BBAEADC-D1DE-46EF-808C-2F6D2A74D988" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc1:*:*:*:*:*:*", - "matchCriteriaId": "AEF8EB4B-2947-4BD3-ADF3-345AEFE85B05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc2:*:*:*:*:*:*", - "matchCriteriaId": "E4476FB3-A759-49F5-ABDE-6D2A321B61BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.20:rc3:*:*:*:*:*:*", - "matchCriteriaId": "DFC109C3-2F52-48BE-B07E-3D65F31C1012" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "E54101A9-3967-4111-8A03-DA1BB23141BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D8B00600-1D45-41F7-9A10-97FB39012FDF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21:rc2:*:*:*:*:*:*", - "matchCriteriaId": "D8CB2331-0F95-45E0-AF5B-0B9C74C5BA88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D4ADB6A7-76AC-4AE3-B1AA-9F8DFA635418" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.21.2:*:*:*:*:*:*:*", - "matchCriteriaId": "776BC35C-CF37-4F4E-9FD5-EC351D4C2C2D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F10DAABC-FF06-44FB-98EC-B6AD17C03FBC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc3:*:*:*:*:*:*", - "matchCriteriaId": "ACA8AFD5-4C7C-4876-93CA-C5B3E881C455" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22:rc4:*:*:*:*:*:*", - "matchCriteriaId": "547EEB2B-2ECA-4B00-83BB-CFAA11BE0145" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.1:*:*:*:*:*:*:*", - "matchCriteriaId": "83829E0F-C24B-4BD6-88EA-98898A9AD86E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.22.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D4C19141-823E-4057-A699-FD1DFF92DF38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "ECE7FE41-E749-49B8-99DF-19F9E7C4827A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc1:*:*:*:*:*:*", - "matchCriteriaId": "4E78234B-39B6-4DB4-A10F-AA55F174D4F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc2:*:*:*:*:*:*", - "matchCriteriaId": "3984CF42-2431-4661-B333-C6721DF7123A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4.23:rc3:*:*:*:*:*:*", - "matchCriteriaId": "303CBFC2-22C1-47CE-A26C-A99B05763374" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*", - "matchCriteriaId": "2A8012CE-4D4B-4131-87E7-16D7907E3BB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta1:*:*:*:*:*:*", - "matchCriteriaId": "D4F88914-6097-4AF1-8337-DCF062EB88AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta2:*:*:*:*:*:*", - "matchCriteriaId": "8BDB49DC-5344-451E-B8D6-D02C3431CE78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta3:*:*:*:*:*:*", - "matchCriteriaId": "B1FDA8D3-5082-479B-BA0A-F1E83D750B5F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta4:*:*:*:*:*:*", - "matchCriteriaId": "7305910F-42BA-44CE-A7AC-B6F74200B68D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta5:*:*:*:*:*:*", - "matchCriteriaId": "B93EB4D6-3375-44BC-870F-714A3BC00C2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7:*:*:*:*:*:*", - "matchCriteriaId": "52F60D6E-64EB-4223-8A79-595693B444C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta7.1:*:*:*:*:*:*", - "matchCriteriaId": "37CF29B9-4397-4298-9326-0443E666CDC8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta8:*:*:*:*:*:*", - "matchCriteriaId": "7D85DA34-A977-4A82-8E79-7BFE064DE9EE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:beta9:*:*:*:*:*:*", - "matchCriteriaId": "1476EF7B-A6F8-4B10-AF0F-986EA6BA3116" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "98E222F0-4CAA-4247-A00D-C6CEC2E55198" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "63744245-6126-47F6-B9F5-E936538140C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "C8805BEE-A4CF-45C2-B948-F1E8EF0A0886" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4E474C33-B42A-4BB8-AC57-8A9071316240" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B83B3132-7D78-4AC3-B83A-A6A20AA28993" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0147FCED-AE75-4945-B76E-33F2AA764B9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.0.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "9C976AB0-2D1A-40CA-AEC3-E271B59B6960" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:open_source:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6613838D-452D-45B4-814D-102C0C86C31E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:opensource:1.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "9E5BFF9D-13AD-4278-9600-F51E79747438" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:opensource:1.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "8FFFD837-E531-458C-AC94-25B378E62000" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:asterisk:opensource:1.4.23.1:*:*:*:*:*:*:*", - "matchCriteriaId": "154A2A5F-8431-4E4F-B1E5-070C3BD0B591" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:h:asterisk:appliance_s800i:1.3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B08893AA-F51D-44CA-97C1-8E7E5A7A7F54" + "criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*", + "versionEndExcluding": "b.2.5.9", + "matchCriteriaId": "C7DBF0A2-9606-43EF-88E6-905B4864D377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*", + "versionStartIncluding": "c.2.0", + "versionEndIncluding": "c.2.4.1", + "matchCriteriaId": "945FA0F6-42A8-4AF4-9EF6-4B16D08B2724" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digium:asterisk:*:*:business:*:*:*:*:*", + "versionStartIncluding": "c.3.0", + "versionEndExcluding": "c.3.1", + "matchCriteriaId": "7375080A-38B8-4230-875B-FC6184F23792" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:digium:s800i_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndExcluding": "1.3.0.3", + "matchCriteriaId": "3E7FEE3E-B19C-4E7E-92D6-D0032A5DAA59" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:digium:s800i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15C35F93-0E57-4AEB-AA5F-4EDFAE753451" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndExcluding": "1.2.34", + "matchCriteriaId": "86564062-C367-4652-820A-7B4700011463" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndExcluding": "1.4.26.1", + "matchCriteriaId": "2CD3CE8A-7145-4501-A61A-D29F575E8795" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.0", + "versionEndExcluding": "1.6.0.12", + "matchCriteriaId": "9E6BB86F-2FC7-4830-AC2E-4F114D87FE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.1", + "versionEndExcluding": "1.6.1.4", + "matchCriteriaId": "A4DBF98F-EF1D-4DC0-93FE-2EC280AAA5EF" } ] } @@ -828,31 +155,59 @@ "references": [ { "url": "http://downloads.digium.com/pub/security/AST-2009-005.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://labs.mudynamics.com/advisories/MU-200908-01.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36227", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://www.securityfocus.com/archive/1/505669/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/36015", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1022705", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/2229", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2009/CVE-2009-35xx/CVE-2009-3547.json b/CVE-2009/CVE-2009-35xx/CVE-2009-3547.json index d00522d185a..8b1f4b0b82b 100644 --- a/CVE-2009/CVE-2009-35xx/CVE-2009-3547.json +++ b/CVE-2009/CVE-2009-35xx/CVE-2009-3547.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3547", "sourceIdentifier": "secalert@redhat.com", "published": "2009-11-04T15:30:00.640", - "lastModified": "2023-11-03T17:14:08.203", + "lastModified": "2024-02-15T21:12:00.877", "vulnStatus": "Analyzed", "descriptions": [ { @@ -75,6 +75,10 @@ { "lang": "en", "value": "CWE-476" + }, + { + "lang": "en", + "value": "CWE-672" } ] } @@ -522,8 +526,7 @@ "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html", "source": "secalert@redhat.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] } ] diff --git a/CVE-2009/CVE-2009-36xx/CVE-2009-3616.json b/CVE-2009/CVE-2009-36xx/CVE-2009-3616.json index 5ba15fa9e26..c3720aa9269 100644 --- a/CVE-2009/CVE-2009-36xx/CVE-2009-3616.json +++ b/CVE-2009/CVE-2009-36xx/CVE-2009-3616.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3616", "sourceIdentifier": "secalert@redhat.com", "published": "2009-10-23T18:30:00.390", - "lastModified": "2020-11-02T14:39:17.710", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:06:20.270", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-416" } ] } @@ -65,181 +87,26 @@ "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "versionEndIncluding": "0.10.6", "matchCriteriaId": "27270035-8337-4B8E-8305-951D7063F2D1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BC82CD08-F151-489C-9BC4-50C8C9583718" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "75D04344-C6CE-40D5-97ED-42B3DBA1AAD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "71CC4D45-66BE-4C23-B541-DD4604ACC9FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "2E41058D-380C-4098-96FB-53CC158ED420" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "BFE12226-C599-45A2-8CFD-32753F94204B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C06F8832-B32F-4352-B048-A4ADCE85373E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5278C685-988B-40D7-9AE9-B4FB8AF41C8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C6C6B20B-2E5D-4D25-885A-227A4BE5EEBB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F2FF7251-031D-4A9B-9AF0-1FFE556456D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4D942D17-1AA9-4D5A-8F5E-0F4F762522D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5A2519BF-5F68-4096-8DE2-2C7BCF7200D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6B00BD71-2AE5-47BA-999A-7E89590B86C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CA6701A9-78CC-49D0-A40A-CB1C774400AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "40B5A7F2-B5B2-46CF-BBD0-AB986A8E55EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DBEBD56F-EFBC-4620-A77C-E215A7AFDAFE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5C45EA44-ECD1-40A7-89CE-D770BDC9DB4D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "83088B0F-A6F8-4F47-99C0-09FEA234272F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "17E948D4-6C1A-43D2-B128-1A728FD61703" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6470915C-CA3C-42CA-B69B-0FC40A33D02D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "759505BA-6F19-4BAE-8297-D8F30EEC8D8C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0A98CC34-2DB7-46CD-AA60-A7C08DDF22B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E424B63B-DCD8-4209-A4CB-84C1EDF5B255" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F9576AA2-2FDD-4063-8D84-DE8DB063AC54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "544368B2-37BE-41DD-8DC2-F04B6A394696" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "14A6B570-09CE-4AFF-AC8C-51F37FC79811" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EC5670FB-B9EA-4B9C-BB7B-575494F12CA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27650033-1C9F-4175-A26F-D9082A36F079" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7F1D35E0-2033-4ADE-9ADA-3B45996B53B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6205775B-4A83-498F-A60E-54473F5D5704" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "39A6382B-A08C-4D58-B3F9-D74132A74B86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7483B9F2-246C-4B78-9EFA-7734B7209054" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A83436B8-AFC9-4AA2-8414-1F703812718D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BCA47F54-B59B-45EC-B5D4-DF544E4BE1AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "4786DEA6-6F23-4969-B7E0-C664FCB2284E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EA3CABBB-9C1F-4ACD-A2AC-8320348DDA99" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" } ] } @@ -251,6 +118,7 @@ "url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=198a0039c5", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Exploit" ] }, @@ -258,40 +126,71 @@ "url": "http://git.savannah.gnu.org/cgit/qemu.git/commit/?id=753b405331", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Exploit" ] }, { "url": "http://marc.info/?l=qemu-devel&m=124324043812915", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://rhn.redhat.com/errata/RHEA-2009-1272.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/10/16/5", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/10/16/8", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://www.securityfocus.com/bid/36716", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501131", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505641", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508567", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-40xx/CVE-2009-4017.json b/CVE-2009/CVE-2009-40xx/CVE-2009-4017.json index 8b3f0295495..dc172a0c9fd 100644 --- a/CVE-2009/CVE-2009-40xx/CVE-2009-4017.json +++ b/CVE-2009/CVE-2009-40xx/CVE-2009-4017.json @@ -2,8 +2,8 @@ "id": "CVE-2009-4017", "sourceIdentifier": "secalert@redhat.com", "published": "2009-11-24T00:30:00.500", - "lastModified": "2018-10-10T19:48:06.190", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:16:16.510", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-770" } ] } @@ -62,13 +62,84 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "2CDFB7E9-8510-430F-BFBC-FD811D60DC78" + "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2.12", + "matchCriteriaId": "F2304370-EDAF-4417-B624-498C427EBF53" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF" + "criteria": "cpe:2.3:a:php:php:5.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A315BCF0-71F5-4664-B25B-019B8A1075BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:alpha1:*:*:*:*:*:*", + "matchCriteriaId": "1DF14239-64E0-46F0-A8DE-8BB11EEC2F1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:alpha2:*:*:*:*:*:*", + "matchCriteriaId": "BDC814D7-52A0-4610-B812-1F47C08BEF8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:alpha3:*:*:*:*:*:*", + "matchCriteriaId": "9E66A080-A759-41BA-99A6-70074DF2A1E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "F9D343FF-1DC6-477C-8DBA-D3C309D1B9BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "1F397590-70B4-43B9-9F5B-BC1020393A68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17586008-7FBC-4238-B208-4563040D1982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F5D02F98-10F7-4F7B-A31E-7C28EC034BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:php:php:5.3.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "8F021309-38E4-4D19-B1EB-975D9F42F4F3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244" } ] } @@ -78,94 +149,187 @@ "references": [ { "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=127680701405735&w=2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://news.php.net/php.announce/79", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Release Notes" + ] }, { "url": "http://seclists.org/fulldisclosure/2009/Nov/228", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/37482", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/37821", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/40262", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/41480", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/41490", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://support.apple.com/kb/HT4077", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.acunetix.com/blog/websecuritynews/php-multipartform-data-denial-of-service/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1940", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:303", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:305", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/11/20/2", "source": "secalert@redhat.com", "tags": [ + "Mailing List", "Patch" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/11/20/7", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.php.net/ChangeLog-5.php", "source": "secalert@redhat.com", "tags": [ - "Patch", + "Release Notes", "Vendor Advisory" ] }, { "url": "http://www.php.net/releases/5_2_12.php", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.php.net/releases/5_3_1.php", "source": "secalert@redhat.com", "tags": [ - "Patch", + "Release Notes", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/507982/100/0/threaded", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2009/3593", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54455", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10483", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6667", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0249.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0249.json index ea9329678f1..c52fc66464c 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0249.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0249.json @@ -2,9 +2,9 @@ "id": "CVE-2010-0249", "sourceIdentifier": "secure@microsoft.com", "published": "2010-01-15T17:30:00.533", - "lastModified": "2019-02-26T14:04:01.963", - "vulnStatus": "Modified", - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/416.htmlhttp://cwe.mitre.org/data/definitions/416.html\r\n\r\nCWE-416: Use After Free", + "lastModified": "2024-02-15T21:06:48.057", + "vulnStatus": "Analyzed", + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/416.htmlhttp://cwe.mitre.org/data/definitions/416.html\n\nCWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -49,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-416" } ] } @@ -64,23 +86,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", - "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507" + "criteria": "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*", + "matchCriteriaId": "2EB39B99-91A0-4B70-B12A-BA37F6AFBA83" }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", - "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", - "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283" } ] }, @@ -90,8 +102,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_2000:sp4:*:*:*:*:*:*:*", - "matchCriteriaId": "11AFB73A-1C61-40F1-8415-E4D40BB2699B" + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", + "matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5" } ] } @@ -106,23 +118,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", - "matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", - "matchCriteriaId": "D47247A3-7CD7-4D67-9D9B-A94A504DA1BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", - "matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", - "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283" + "criteria": "cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*", + "matchCriteriaId": "0C69B5E6-D1AF-46F1-8AE6-DD5D4E3D9160" } ] }, @@ -132,13 +129,60 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", - "matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*", + "matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020" + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6BC71FD8-D385-4507-BD14-B75FDD4C79E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*", + "matchCriteriaId": "9F98AE07-3995-4501-9804-FEA5A87ADFAD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" }, { "vulnerable": false, @@ -152,33 +196,115 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", - "matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*", + "matchCriteriaId": "E20CAA29-B5A9-4D99-9775-4945469C3A9A" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*", + "matchCriteriaId": "889F98DA-4266-470B-AE3D-480BDF6BADB9" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3" + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*", + "matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", - "matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*", - "matchCriteriaId": "E69F8C21-5996-4083-A02A-F04AE948CEA9" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", + "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*", + "matchCriteriaId": "B20DD263-5A62-4CB1-BD47-D1F9A6C67E08" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "B7674920-AE12-4A25-BE57-34AEDDA74D76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*", + "matchCriteriaId": "E20CAA29-B5A9-4D99-9775-4945469C3A9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*", + "matchCriteriaId": "889F98DA-4266-470B-AE3D-480BDF6BADB9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*", + "matchCriteriaId": "08627673-D381-4481-BD04-F56599C43105" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", + "matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", + "matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9" } ] } @@ -190,32 +316,55 @@ "url": "http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://news.cnet.com/8301-27080_3-10435232-245.html", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://osvdb.org/61697", + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1023462", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://support.microsoft.com/kb/979352", "source": "secure@microsoft.com", "tags": [ + "Patch", "Vendor Advisory" ] }, { "url": "http://www.exploit-db.com/exploits/11167", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kb.cert.org/vuls/id/492515", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, @@ -223,6 +372,8 @@ "url": "http://www.microsoft.com/technet/security/advisory/979352.mspx", "source": "secure@microsoft.com", "tags": [ + "Broken Link", + "Patch", "Vendor Advisory" ] }, @@ -230,31 +381,50 @@ "url": "http://www.securityfocus.com/bid/37815", "source": "secure@microsoft.com", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-055A.html", "source": "secure@microsoft.com", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2010/0135", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55642", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-15xx/CVE-2013-1591.json b/CVE-2013/CVE-2013-15xx/CVE-2013-1591.json index a5413f82ae7..c8fb9649361 100644 --- a/CVE-2013/CVE-2013-15xx/CVE-2013-1591.json +++ b/CVE-2013/CVE-2013-15xx/CVE-2013-1591.json @@ -2,8 +2,8 @@ "id": "CVE-2013-1591", "sourceIdentifier": "cve@mitre.org", "published": "2013-01-31T23:55:01.037", - "lastModified": "2019-05-22T13:29:00.273", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:08:00.480", + "vulnStatus": "Analyzed", "evaluatorComment": "Adding additional products per \n\nhttp://rhn.redhat.com/errata/RHSA-2013-0687.html\n\nRed Hat Enterprise Linux 6\n\nhttp://rhn.redhat.com/errata/RHSA-2013-0746.html\n\nRed Hat Enterprise Virtualization 3", "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -49,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-190" } ] } @@ -94,153 +116,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*", - "versionEndIncluding": "15.3.2", - "matchCriteriaId": "72E237ED-4EE8-43ED-9927-89B2DC70E615" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EF53A010-E526-44F0-B52F-5D4084363A72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C587591A-7B7C-4FCB-ABAC-CC879DB28D53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C8F0AF44-2944-4D7D-9E79-F88EF47E2FFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE971AB-4919-4260-96C9-0A95AD1265A7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:4.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "401A541A-DCD9-4AE5-9080-056F375F3F27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FD483627-6FFC-4DF9-9B19-3FA5FB79BBD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6FBA6FA7-B579-482D-AFE0-58ED482AE518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C0773C61-B6B0-48EE-A231-ABAA3BF1C3F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E9FF328C-4897-4317-8F79-BFDCD5EC4394" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C71B58E7-DDA9-4A87-A4C1-3B21F082924E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B280BFE5-FF46-44C6-BC54-51694A96781A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:9.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "931C0E2A-4750-431F-9F7B-F15F8C4153E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8140D29C-F0D8-48EC-B5FE-1561871437E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "ED21EE76-1C79-4232-97FB-03D5CCEB97BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:11.0:*:*:*:*:*:*:*", - "matchCriteriaId": "325CB2E9-5EA1-44BE-B565-D59BDD4317A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:11.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "374BF6AB-5E7E-477D-9A6B-511BDFEAEED7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B055FDB0-E787-45E7-9BD1-7C5042FCB32F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "797419CD-C40E-4752-8148-1FC79517863A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27157FE6-B356-41D2-9231-289ADD70B57E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:12.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D08A65FA-2485-4E24-99E7-66DF375BDE7E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C9665CC3-077C-4F8D-A6F8-7BC1AC5B3BFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:12.3:r2:*:*:*:*:*:*", - "matchCriteriaId": "F58FB782-79A3-48C2-90EF-CC2C93A0976C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8F7B8D10-57B4-4F84-8B39-94E3141946C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.1:*:*:*:*:*:*:*", - "matchCriteriaId": "008AB17C-2121-4E26-A104-F808D35BB40E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "67718722-1B66-42E4-A161-9CC493DC1C7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.2:*:*:*:*:*:*:*", - "matchCriteriaId": "82AD08D0-2FD7-4C4B-939E-5774A35683A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C640C804-C6FA-4B27-A7E3-7DFEFB096EA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "40EA799F-EE5E-4349-9C12-8D883F643495" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:palemoon:pale_moon:15.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "20C7D39F-A609-4F5F-B8B2-CDDCE19C7C61" + "versionEndExcluding": "15.4", + "matchCriteriaId": "DC382A9A-521E-4EF7-8EAC-F262B26E4170" } ] } @@ -252,7 +129,7 @@ "url": "http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f", "source": "cve@mitre.org", "tags": [ - "Exploit", + "Mailing List", "Patch" ] }, @@ -260,39 +137,52 @@ "url": "http://rhn.redhat.com/errata/RHSA-2013-0687.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:116", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.palemoon.org/releasenotes-ng.shtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910149", "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Patch" ] }, { "url": "https://support.f5.com/csp/article/K51392553", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json b/CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json index 96192d1c439..70f243f359f 100644 --- a/CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json +++ b/CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1000121", "sourceIdentifier": "cve@mitre.org", "published": "2017-11-01T21:29:00.280", - "lastModified": "2017-11-21T19:22:16.807", + "lastModified": "2024-02-15T21:22:29.757", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -98,7 +98,7 @@ "url": "http://trac.webkit.org/changeset/217126/webkit", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Patch" ] }, { diff --git a/CVE-2017/CVE-2017-151xx/CVE-2017-15100.json b/CVE-2017/CVE-2017-151xx/CVE-2017-15100.json index d56ac15969b..23092a5b551 100644 --- a/CVE-2017/CVE-2017-151xx/CVE-2017-15100.json +++ b/CVE-2017/CVE-2017-151xx/CVE-2017-15100.json @@ -2,8 +2,8 @@ "id": "CVE-2017-15100", "sourceIdentifier": "secalert@redhat.com", "published": "2017-11-27T14:29:00.397", - "lastModified": "2023-02-12T23:28:25.533", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:36:51.383", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -101,6 +101,26 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:satellite:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FB283C80-F7AF-4776-8432-655E50D7D65B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "461407B5-C167-4DE1-A934-FD5ADFB4AD4E" + } + ] + } + ] } ], "references": [ @@ -108,12 +128,16 @@ "url": "http://projects.theforeman.org/issues/21519", "source": "secalert@redhat.com", "tags": [ + "Issue Tracking", "Vendor Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:2927", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/theforeman/foreman/pull/4967", diff --git a/CVE-2019/CVE-2019-95xx/CVE-2019-9534.json b/CVE-2019/CVE-2019-95xx/CVE-2019-9534.json index 8dc1f316ec4..ae3ac3194c6 100644 --- a/CVE-2019/CVE-2019-95xx/CVE-2019-9534.json +++ b/CVE-2019/CVE-2019-95xx/CVE-2019-9534.json @@ -2,7 +2,7 @@ "id": "CVE-2019-9534", "sourceIdentifier": "cret@cert.org", "published": "2019-10-10T20:15:11.537", - "lastModified": "2019-10-16T18:07:27.007", + "lastModified": "2024-02-15T21:20:26.287", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-434" + "value": "CWE-494" } ] }, diff --git a/CVE-2020/CVE-2020-170xx/CVE-2020-17087.json b/CVE-2020/CVE-2020-170xx/CVE-2020-17087.json index 2fdb09e6524..adeb1ffc39c 100644 --- a/CVE-2020/CVE-2020-170xx/CVE-2020-17087.json +++ b/CVE-2020/CVE-2020-170xx/CVE-2020-17087.json @@ -2,8 +2,8 @@ "id": "CVE-2020-17087", "sourceIdentifier": "secure@microsoft.com", "published": "2020-11-11T07:15:18.997", - "lastModified": "2023-12-31T19:15:29.023", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:27:14.377", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2022-05-03", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -94,7 +94,7 @@ "description": [ { "lang": "en", - "value": "CWE-681" + "value": "CWE-131" } ] } diff --git a/CVE-2021/CVE-2021-30xx/CVE-2021-3011.json b/CVE-2021/CVE-2021-30xx/CVE-2021-3011.json index 704867eb570..250ccb87f6f 100644 --- a/CVE-2021/CVE-2021-30xx/CVE-2021-3011.json +++ b/CVE-2021/CVE-2021-30xx/CVE-2021-3011.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3011", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-07T16:15:12.120", - "lastModified": "2023-07-20T18:53:46.410", + "lastModified": "2024-02-15T21:20:33.287", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-203" + "value": "CWE-670" } ] } diff --git a/CVE-2021/CVE-2021-31xx/CVE-2021-3116.json b/CVE-2021/CVE-2021-31xx/CVE-2021-3116.json index a346e22015e..7245698c908 100644 --- a/CVE-2021/CVE-2021-31xx/CVE-2021-3116.json +++ b/CVE-2021/CVE-2021-31xx/CVE-2021-3116.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3116", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-11T05:15:10.987", - "lastModified": "2021-01-14T15:09:25.177", + "lastModified": "2024-02-15T21:40:16.967", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-697" } ] } @@ -106,16 +106,14 @@ "url": "https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { "url": "https://pypi.org/project/proxy.py/2.3.1/#history", "source": "cve@mitre.org", "tags": [ - "Product", - "Third Party Advisory" + "Product" ] } ] diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json index 7175325a93a..b8d25dec17f 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1511.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1511", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-28T15:15:09.637", - "lastModified": "2023-06-29T09:15:10.767", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:31:56.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1796.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1796.json index bcf978e1566..f1d02101e5c 100644 --- a/CVE-2022/CVE-2022-17xx/CVE-2022-1796.json +++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1796.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1796", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-19T16:15:07.903", - "lastModified": "2023-05-03T12:15:31.513", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:28:57.780", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -151,7 +151,10 @@ }, { "url": "https://security.gentoo.org/glsa/202305-16", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-268xx/CVE-2022-26833.json b/CVE-2022/CVE-2022-268xx/CVE-2022-26833.json index bea61b78918..926416c2b87 100644 --- a/CVE-2022/CVE-2022-268xx/CVE-2022-26833.json +++ b/CVE-2022/CVE-2022-268xx/CVE-2022-26833.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26833", "sourceIdentifier": "talos-cna@cisco.com", "published": "2022-05-25T21:15:08.250", - "lastModified": "2023-07-26T18:15:10.767", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:26:52.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", + "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, + "baseScore": 9.4, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 5.5 }, { "source": "talos-cna@cisco.com", diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30308.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30308.json index 6e7b12d1f36..d6019528a60 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30308.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30308.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30308", "sourceIdentifier": "info@cert.vde.com", "published": "2022-06-13T14:15:09.097", - "lastModified": "2023-08-10T08:15:09.227", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:23:56.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,7 +17,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30310.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30310.json index 1e94c50655e..ae37304310a 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30310.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30310.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30310", "sourceIdentifier": "info@cert.vde.com", "published": "2022-06-13T14:15:09.227", - "lastModified": "2023-08-10T08:15:09.683", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:23:18.460", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-310xx/CVE-2022-31001.json b/CVE-2022/CVE-2022-310xx/CVE-2022-31001.json index 72af0436489..1e32d62c80b 100644 --- a/CVE-2022/CVE-2022-310xx/CVE-2022-31001.json +++ b/CVE-2022/CVE-2022-310xx/CVE-2022-31001.json @@ -2,8 +2,8 @@ "id": "CVE-2022-31001", "sourceIdentifier": "security-advisories@github.com", "published": "2022-05-31T20:15:07.850", - "lastModified": "2023-05-24T21:15:10.540", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:24:56.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -132,6 +132,11 @@ "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" } ] } @@ -172,7 +177,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5410", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-312xx/CVE-2022-31216.json b/CVE-2022/CVE-2022-312xx/CVE-2022-31216.json index a045003ce46..cade253e542 100644 --- a/CVE-2022/CVE-2022-312xx/CVE-2022-31216.json +++ b/CVE-2022/CVE-2022-312xx/CVE-2022-31216.json @@ -2,8 +2,8 @@ "id": "CVE-2022-31216", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2022-06-15T19:15:11.367", - "lastModified": "2023-09-13T04:15:09.910", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:22:59.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,7 +11,7 @@ }, { "lang": "es", - "value": "Unas vulnerabilidades en Drive Composer permiten a un atacante con pocos privilegios crear y escribir en un archivo en cualquier parte del sistema de archivos como SYSTEM con contenido arbitrario siempre que el archivo no exista ya. El archivo de instalaci\u00f3n de Drive Composer permite a un usuario con pocos privilegios ejecutar una operaci\u00f3n de \"reparaci\u00f3n\" en el producto" + "value": "Las vulnerabilidades en Drive Composer permiten a un atacante con pocos privilegios crear y escribir en un archivo en cualquier lugar del sistema de archivos como SYSTEM con contenido arbitrario, siempre y cuando el archivo no exista ya. El archivo de instalaci\u00f3n de Drive Composer permite a un usuario con pocos privilegios ejecutar una operaci\u00f3n de \"repair\" en el producto." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json index 2b8201697de..a80f806038a 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3391", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-23T16:15:09.693", - "lastModified": "2023-12-26T19:56:27.157", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:18:21.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40057.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40057.json new file mode 100644 index 00000000000..2ac2d9b030d --- /dev/null +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40057.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40057", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-02-15T21:15:08.247", + "lastModified": "2024-02-15T21:15:08.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SolarWinds Access Rights Manager was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service resulting in remote code execution.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40057", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json index 87e14e9e778..625c45b241f 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45269", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-13T16:15:12.853", - "lastModified": "2023-11-15T17:15:41.743", - "vulnStatus": "Modified", + "lastModified": "2024-02-15T21:47:21.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,8 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:coleds:simple_seo:*:*:*:*:*:wordpress:*:*", - "versionEndIncluding": "2.0.23", - "matchCriteriaId": "C92E0C08-77BE-43FA-AF92-C8931442A1E9" + "versionEndExcluding": "2.0.26", + "matchCriteriaId": "3CCD0E06-BF40-4076-857E-6D119723FA3E" } ] } diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50858.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50858.json index 1917d594f9b..546ba4d47ec 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50858.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50858.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50858", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-28T11:15:10.120", - "lastModified": "2024-01-05T16:24:19.057", + "lastModified": "2024-02-15T21:38:57.473", "vulnStatus": "Analyzed", "descriptions": [ { @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:billminozzi:anit_hacker:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:billminozzi:anti_hacker:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.34", - "matchCriteriaId": "C9443507-F4F2-43FD-87EC-83914F8B413E" + "matchCriteriaId": "8231C740-A3C3-4FE6-95D8-020678839942" } ] } diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51480.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51480.json index 50963d2f9ce..7beaa856ab0 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51480.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51480.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51480", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-10T09:15:07.990", - "lastModified": "2024-02-15T06:26:21.503", + "lastModified": "2024-02-15T21:06:20.197", "vulnStatus": "Analyzed", "descriptions": [ { @@ -89,8 +89,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pluginus:active_products_tables_for_woocommerce:1.0.6:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "327A99ED-90FE-4043-903F-B8CE8F5772EF" + "criteria": "cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.6", + "matchCriteriaId": "573AA7BD-EB43-41C2-96DB-142251E723FB" } ] } diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json new file mode 100644 index 00000000000..6803fcd24da --- /dev/null +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-6123", + "sourceIdentifier": "security@opentext.com", + "published": "2024-02-15T21:15:08.500", + "lastModified": "2024-02-15T21:15:08.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization vulnerability affects OpenText ALM Octane\u00a0version 16.2.100 and above.\u00a0The vulnerability could result in a remote code execution attack. \n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000026128?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json new file mode 100644 index 00000000000..8559d6f4643 --- /dev/null +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-0240", + "sourceIdentifier": "product-security@silabs.com", + "published": "2024-02-15T21:15:08.673", + "lastModified": "2024-02-15T21:15:08.673", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A memory leak in the Silicon Labs' Bluetooth stack for EFR32 products may cause memory to be exhausted when sending notifications to multiple clients, this results in all Bluetooth operations, such as advertising and scanning, to stop." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/069Vm000001AjEfIAK", + "source": "product-security@silabs.com" + }, + { + "url": "https://github.com/SiliconLabs/gecko_sdk", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json new file mode 100644 index 00000000000..97f046cfc9a --- /dev/null +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0622", + "sourceIdentifier": "security@opentext.com", + "published": "2024-02-15T21:15:08.860", + "lastModified": "2024-02-15T21:15:08.860", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Local privilege escalation vulnerability\u00a0affects OpenText Operations Agent product versions 12.15 and 12.20-12.25 when installed on no-Windows platforms. The vulnerability\u00a0could allow local privilege escalation.\u00a0\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000026555?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json index 2fb67c3fc84..6ae5a359f61 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0646", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-17T16:15:47.190", - "lastModified": "2024-02-07T21:15:09.327", + "lastModified": "2024-02-15T21:15:09.070", "vulnStatus": "Modified", "descriptions": [ { @@ -141,6 +141,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:0725", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0850", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:0851", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0646", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json new file mode 100644 index 00000000000..85f02c6feea --- /dev/null +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21728.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-21728", + "sourceIdentifier": "security@joomla.org", + "published": "2024-02-15T21:15:09.220", + "lastModified": "2024-02-15T21:15:09.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Open Redirect vulnerability was found in osTicky2 below 2.2.8. osTicky (osTicket Bridge) by SmartCalc is a Joomla 3.x extension that provides Joomla fronted integration with osTicket, a popular Support ticket system. The Open Redirect vulnerability allows attackers to control the return parameter in the URL to a base64 malicious URL." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/solracsf/osTicky", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23476.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23476.json new file mode 100644 index 00000000000..78a61aee97a --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23476.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23476", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-02-15T21:15:09.353", + "lastModified": "2024-02-15T21:15:09.353", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve the Remote Code Execution.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23476", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23477.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23477.json new file mode 100644 index 00000000000..88d4e66e381 --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23477.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23477", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-02-15T21:15:09.603", + "lastModified": "2024-02-15T21:15:09.603", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.9, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23477", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23478.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23478.json new file mode 100644 index 00000000000..e806b974547 --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23478.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23478", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-02-15T21:15:09.867", + "lastModified": "2024-02-15T21:15:09.867", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Remote Code Execution Vulnerability. If exploited, this vulnerability allows an authenticated user to abuse a SolarWinds service, resulting in remote code execution.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23478", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23479.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23479.json new file mode 100644 index 00000000000..61719987531 --- /dev/null +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23479.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23479", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-02-15T21:15:10.213", + "lastModified": "2024-02-15T21:15:10.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-23479", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25123.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25123.json new file mode 100644 index 00000000000..1e7b5aec22e --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25123.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-25123", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-02-15T22:15:48.060", + "lastModified": "2024-02-15T22:15:48.060", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "MSS (Mission Support System) is an open source package designed for planning atmospheric research flights. In file: `index.py`, there is a method that is vulnerable to path manipulation attack. By modifying file paths, an attacker can acquire sensitive information from different resources. The `filename` variable is joined with other variables to form a file path in `_file`. However, `filename` is a route parameter that can capture path type values i.e. values including slashes (\\). So it is possible for an attacker to manipulate the file being read by assigning a value containing ../ to `filename` and so the attacker may be able to gain access to other files on the host filesystem. This issue has been addressed in MSS version 8.3.3. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Open-MSS/MSS/commit/f23033729ee930b97f8bdbd07df0174311c9b658", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 11d0355d627..d94e44353f0 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-15T21:00:26.928151+00:00 +2024-02-15T23:00:24.830948+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-15T20:59:49.467000+00:00 +2024-02-15T22:15:48.060000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238692 +238702 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `10` -* [CVE-2024-25373](CVE-2024/CVE-2024-253xx/CVE-2024-25373.json) (`2024-02-15T19:15:14.750`) -* [CVE-2024-25502](CVE-2024/CVE-2024-255xx/CVE-2024-25502.json) (`2024-02-15T20:15:45.483`) +* [CVE-2023-40057](CVE-2023/CVE-2023-400xx/CVE-2023-40057.json) (`2024-02-15T21:15:08.247`) +* [CVE-2023-6123](CVE-2023/CVE-2023-61xx/CVE-2023-6123.json) (`2024-02-15T21:15:08.500`) +* [CVE-2024-0240](CVE-2024/CVE-2024-02xx/CVE-2024-0240.json) (`2024-02-15T21:15:08.673`) +* [CVE-2024-0622](CVE-2024/CVE-2024-06xx/CVE-2024-0622.json) (`2024-02-15T21:15:08.860`) +* [CVE-2024-21728](CVE-2024/CVE-2024-217xx/CVE-2024-21728.json) (`2024-02-15T21:15:09.220`) +* [CVE-2024-23476](CVE-2024/CVE-2024-234xx/CVE-2024-23476.json) (`2024-02-15T21:15:09.353`) +* [CVE-2024-23477](CVE-2024/CVE-2024-234xx/CVE-2024-23477.json) (`2024-02-15T21:15:09.603`) +* [CVE-2024-23478](CVE-2024/CVE-2024-234xx/CVE-2024-23478.json) (`2024-02-15T21:15:09.867`) +* [CVE-2024-23479](CVE-2024/CVE-2024-234xx/CVE-2024-23479.json) (`2024-02-15T21:15:10.213`) +* [CVE-2024-25123](CVE-2024/CVE-2024-251xx/CVE-2024-25123.json) (`2024-02-15T22:15:48.060`) ### CVEs modified in the last Commit -Recently modified CVEs: `73` +Recently modified CVEs: `44` -* [CVE-2023-6255](CVE-2023/CVE-2023-62xx/CVE-2023-6255.json) (`2024-02-15T19:55:09.230`) -* [CVE-2023-7081](CVE-2023/CVE-2023-70xx/CVE-2023-7081.json) (`2024-02-15T19:55:09.230`) -* [CVE-2023-6937](CVE-2023/CVE-2023-69xx/CVE-2023-6937.json) (`2024-02-15T19:55:09.230`) -* [CVE-2023-46838](CVE-2023/CVE-2023-468xx/CVE-2023-46838.json) (`2024-02-15T19:56:49.537`) -* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-15T20:00:45.203`) -* [CVE-2023-40083](CVE-2023/CVE-2023-400xx/CVE-2023-40083.json) (`2024-02-15T20:25:39.540`) -* [CVE-2023-40082](CVE-2023/CVE-2023-400xx/CVE-2023-40082.json) (`2024-02-15T20:46:11.673`) -* [CVE-2023-6508](CVE-2023/CVE-2023-65xx/CVE-2023-6508.json) (`2024-02-15T20:49:32.050`) -* [CVE-2023-6509](CVE-2023/CVE-2023-65xx/CVE-2023-6509.json) (`2024-02-15T20:50:04.510`) -* [CVE-2023-6510](CVE-2023/CVE-2023-65xx/CVE-2023-6510.json) (`2024-02-15T20:50:56.927`) -* [CVE-2023-6511](CVE-2023/CVE-2023-65xx/CVE-2023-6511.json) (`2024-02-15T20:51:23.697`) -* [CVE-2023-6512](CVE-2023/CVE-2023-65xx/CVE-2023-6512.json) (`2024-02-15T20:51:30.973`) -* [CVE-2023-40653](CVE-2023/CVE-2023-406xx/CVE-2023-40653.json) (`2024-02-15T20:53:14.203`) -* [CVE-2023-40079](CVE-2023/CVE-2023-400xx/CVE-2023-40079.json) (`2024-02-15T20:53:24.200`) -* [CVE-2023-40080](CVE-2023/CVE-2023-400xx/CVE-2023-40080.json) (`2024-02-15T20:53:30.253`) -* [CVE-2023-40081](CVE-2023/CVE-2023-400xx/CVE-2023-40081.json) (`2024-02-15T20:58:09.707`) -* [CVE-2024-0242](CVE-2024/CVE-2024-02xx/CVE-2024-0242.json) (`2024-02-15T19:08:40.337`) -* [CVE-2024-0657](CVE-2024/CVE-2024-06xx/CVE-2024-0657.json) (`2024-02-15T19:09:46.313`) -* [CVE-2024-0842](CVE-2024/CVE-2024-08xx/CVE-2024-0842.json) (`2024-02-15T19:11:14.253`) -* [CVE-2024-1122](CVE-2024/CVE-2024-11xx/CVE-2024-1122.json) (`2024-02-15T19:17:26.630`) -* [CVE-2024-24308](CVE-2024/CVE-2024-243xx/CVE-2024-24308.json) (`2024-02-15T19:34:49.943`) -* [CVE-2024-22119](CVE-2024/CVE-2024-221xx/CVE-2024-22119.json) (`2024-02-15T19:35:45.447`) -* [CVE-2024-25677](CVE-2024/CVE-2024-256xx/CVE-2024-25677.json) (`2024-02-15T19:43:24.983`) -* [CVE-2024-20305](CVE-2024/CVE-2024-203xx/CVE-2024-20305.json) (`2024-02-15T19:56:38.910`) -* [CVE-2024-22216](CVE-2024/CVE-2024-222xx/CVE-2024-22216.json) (`2024-02-15T20:09:29.663`) +* [CVE-2009-3616](CVE-2009/CVE-2009-36xx/CVE-2009-3616.json) (`2024-02-15T21:06:20.270`) +* [CVE-2009-3547](CVE-2009/CVE-2009-35xx/CVE-2009-3547.json) (`2024-02-15T21:12:00.877`) +* [CVE-2009-2054](CVE-2009/CVE-2009-20xx/CVE-2009-2054.json) (`2024-02-15T21:15:40.407`) +* [CVE-2009-4017](CVE-2009/CVE-2009-40xx/CVE-2009-4017.json) (`2024-02-15T21:16:16.510`) +* [CVE-2009-1073](CVE-2009/CVE-2009-10xx/CVE-2009-1073.json) (`2024-02-15T21:31:04.530`) +* [CVE-2010-0249](CVE-2010/CVE-2010-02xx/CVE-2010-0249.json) (`2024-02-15T21:06:48.057`) +* [CVE-2013-1591](CVE-2013/CVE-2013-15xx/CVE-2013-1591.json) (`2024-02-15T21:08:00.480`) +* [CVE-2017-1000121](CVE-2017/CVE-2017-10001xx/CVE-2017-1000121.json) (`2024-02-15T21:22:29.757`) +* [CVE-2017-15100](CVE-2017/CVE-2017-151xx/CVE-2017-15100.json) (`2024-02-15T21:36:51.383`) +* [CVE-2019-9534](CVE-2019/CVE-2019-95xx/CVE-2019-9534.json) (`2024-02-15T21:20:26.287`) +* [CVE-2020-17087](CVE-2020/CVE-2020-170xx/CVE-2020-17087.json) (`2024-02-15T21:27:14.377`) +* [CVE-2021-3011](CVE-2021/CVE-2021-30xx/CVE-2021-3011.json) (`2024-02-15T21:20:33.287`) +* [CVE-2021-3116](CVE-2021/CVE-2021-31xx/CVE-2021-3116.json) (`2024-02-15T21:40:16.967`) +* [CVE-2022-31216](CVE-2022/CVE-2022-312xx/CVE-2022-31216.json) (`2024-02-15T21:22:59.000`) +* [CVE-2022-30310](CVE-2022/CVE-2022-303xx/CVE-2022-30310.json) (`2024-02-15T21:23:18.460`) +* [CVE-2022-30308](CVE-2022/CVE-2022-303xx/CVE-2022-30308.json) (`2024-02-15T21:23:56.537`) +* [CVE-2022-31001](CVE-2022/CVE-2022-310xx/CVE-2022-31001.json) (`2024-02-15T21:24:56.693`) +* [CVE-2022-26833](CVE-2022/CVE-2022-268xx/CVE-2022-26833.json) (`2024-02-15T21:26:52.767`) +* [CVE-2022-1796](CVE-2022/CVE-2022-17xx/CVE-2022-1796.json) (`2024-02-15T21:28:57.780`) +* [CVE-2022-1511](CVE-2022/CVE-2022-15xx/CVE-2022-1511.json) (`2024-02-15T21:31:56.087`) +* [CVE-2023-51480](CVE-2023/CVE-2023-514xx/CVE-2023-51480.json) (`2024-02-15T21:06:20.197`) +* [CVE-2023-3391](CVE-2023/CVE-2023-33xx/CVE-2023-3391.json) (`2024-02-15T21:18:21.387`) +* [CVE-2023-50858](CVE-2023/CVE-2023-508xx/CVE-2023-50858.json) (`2024-02-15T21:38:57.473`) +* [CVE-2023-45269](CVE-2023/CVE-2023-452xx/CVE-2023-45269.json) (`2024-02-15T21:47:21.370`) +* [CVE-2024-0646](CVE-2024/CVE-2024-06xx/CVE-2024-0646.json) (`2024-02-15T21:15:09.070`) ## Download and Usage