diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1127.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1127.json index 0aa228fa7de..a0a8743df42 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1127.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1127.json @@ -2,8 +2,8 @@ "id": "CVE-1999-1127", "sourceIdentifier": "cve@mitre.org", "published": "1999-12-31T05:00:00.000", - "lastModified": "2018-10-12T21:29:22.827", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:35:19.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-772" } ] } @@ -58,8 +80,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21" + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:enterprise:*:*:*", + "matchCriteriaId": "FA9FD6FB-7D96-42C9-AA8D-654A29FCA465" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:server:*:*:*", + "matchCriteriaId": "B48A648C-7D20-4546-B288-FBC795D8FE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*", + "matchCriteriaId": "E30F6C9C-3371-44FF-AD0B-3CAA0AB6F1B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:workstation:*:*:*", + "matchCriteriaId": "22BA7A30-849D-411B-A790-FC175435379B" } ] } @@ -71,17 +108,25 @@ "url": "http://support.microsoft.com/support/kb/articles/Q195/7/33.asp", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/523.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-017", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-1999/CVE-1999-15xx/CVE-1999-1549.json b/CVE-1999/CVE-1999-15xx/CVE-1999-1549.json index 5a66daae84d..9fe995f6e98 100644 --- a/CVE-1999/CVE-1999-15xx/CVE-1999-1549.json +++ b/CVE-1999/CVE-1999-15xx/CVE-1999-1549.json @@ -2,8 +2,8 @@ "id": "CVE-1999-1549", "sourceIdentifier": "cve@mitre.org", "published": "1999-11-16T05:00:00.000", - "lastModified": "2016-10-18T02:05:53.427", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:46:41.593", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-346" } ] } @@ -58,13 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_kansas:lynx:2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E01953FC-9DA9-4C14-9989-6A81AA2B42E8" + "criteria": "cpe:2.3:a:lynx_project:lynx:2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5F143511-3727-4D4A-89A3-226AC46394E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:university_of_kansas:lynx:2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "08198583-325B-42B7-8856-14C864838AE7" + "criteria": "cpe:2.3:a:lynx_project:lynx:2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "D629A2AF-397E-4893-BE86-D396EE88482A" } ] } @@ -74,13 +96,20 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=94286509804526&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/804", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2000/CVE-2000-03xx/CVE-2000-0338.json b/CVE-2000/CVE-2000-03xx/CVE-2000-0338.json index 1badd81abfe..2591cfa036f 100644 --- a/CVE-2000/CVE-2000-03xx/CVE-2000-0338.json +++ b/CVE-2000/CVE-2000-03xx/CVE-2000-0338.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0338", "sourceIdentifier": "cve@mitre.org", "published": "2000-04-23T04:00:00.000", - "lastModified": "2008-09-10T19:04:10.273", + "lastModified": "2024-02-08T19:23:54.833", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-667" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cvs:cvs:1.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F7CA6E-7D45-46C9-A437-0D0C4D3F25CC" + "criteria": "cpe:2.3:a:concurrent_versions_software_project:concurrent_versions_software:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB12A3F8-D509-4EC0-86F0-A832C4D1AE57" } ] } @@ -71,14 +93,22 @@ "url": "http://www.securityfocus.com/bid/1136", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D20000423174038.A520%40clico.pl", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-05xx/CVE-2000-0552.json b/CVE-2000/CVE-2000-05xx/CVE-2000-0552.json index cdea6219082..5f9b5fa9928 100644 --- a/CVE-2000/CVE-2000-05xx/CVE-2000-0552.json +++ b/CVE-2000/CVE-2000-05xx/CVE-2000-0552.json @@ -2,8 +2,8 @@ "id": "CVE-2000-0552", "sourceIdentifier": "cve@mitre.org", "published": "2000-06-06T04:00:00.000", - "lastModified": "2017-10-10T01:29:11.530", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:12:20.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mirabilis:icq:2000.0a:*:*:*:*:*:*:*", - "matchCriteriaId": "1C7B95B0-8CCB-4561-B354-80925B9769D6" + "criteria": "cpe:2.3:a:icq:icq:2000a:*:*:*:*:*:*:*", + "matchCriteriaId": "419A7941-2E5A-42E8-A3CA-E6020B4A9388" } ] } @@ -71,6 +93,7 @@ "url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0237.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -80,13 +103,20 @@ "url": "http://www.securityfocus.com/bid/1307", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4607", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-11xx/CVE-2000-1198.json b/CVE-2000/CVE-2000-11xx/CVE-2000-1198.json index 2c4c551b2b7..69dcbd5d117 100644 --- a/CVE-2000/CVE-2000-11xx/CVE-2000-1198.json +++ b/CVE-2000/CVE-2000-11xx/CVE-2000-1198.json @@ -2,8 +2,8 @@ "id": "CVE-2000-1198", "sourceIdentifier": "cve@mitre.org", "published": "2001-08-31T04:00:00.000", - "lastModified": "2016-10-18T02:09:09.803", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:22:50.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-667" } ] } @@ -74,15 +96,26 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=95624629924545&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=95634229925906&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/1132", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-12xx/CVE-2000-1218.json b/CVE-2000/CVE-2000-12xx/CVE-2000-1218.json index ce95de77aeb..e4b446efc7d 100644 --- a/CVE-2000/CVE-2000-12xx/CVE-2000-1218.json +++ b/CVE-2000/CVE-2000-12xx/CVE-2000-1218.json @@ -2,8 +2,8 @@ "id": "CVE-2000-1218", "sourceIdentifier": "cve@mitre.org", "published": "2000-04-14T04:00:00.000", - "lastModified": "2019-04-30T14:27:13.473", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:47:22.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-346" } ] } @@ -58,38 +80,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", - "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" + "criteria": "cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40FC681A-7B85-4495-8DCC-C459FE7E2F13" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", - "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", - "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", - "matchCriteriaId": "2D3B703C-79B2-4FA2-9E12-713AB977A880" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", - "matchCriteriaId": "AA733AD2-D948-46A0-A063-D29081A56F1F" + "criteria": "cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2354216-8103-49F9-A95C-7DE4F738BBEE" }, { "vulnerable": true, @@ -98,113 +100,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:alpha:*:*:*:*:*", - "matchCriteriaId": "1A4FF113-BDCB-472C-A300-3DE5A12A7031" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "5BDCBCB8-DAA3-465F-ADDE-9143B8251989" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:alpha:*:*:*:*:*", - "matchCriteriaId": "F8E32528-4DA7-4FF8-BBA1-929C5C44FAD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*", - "matchCriteriaId": "B86E0671-ED68-4549-B3AC-FD8BD79B0860" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:alpha:*:*:*:*:*", - "matchCriteriaId": "3F9C691E-CD79-4D8B-BD35-04BDE4422A4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "BB76E7EC-C396-4537-9065-4E815DA7097C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:alpha:*:*:*:*:*", - "matchCriteriaId": "0EF2010D-5D16-40A7-B7DE-8168C76E5BDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "4CD026E2-B073-40A6-AD4A-8C76B9169B01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:alpha:*:*:*:*:*", - "matchCriteriaId": "DD500955-71F7-41AD-96EE-E8CC6A7FA7A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*", - "matchCriteriaId": "DBFB3E49-3FB5-4947-856D-727CBFFBA543" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:alpha:*:*:*:*:*", - "matchCriteriaId": "CC031C07-FA91-426B-9772-64910AE12635" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*", - "matchCriteriaId": "B9236480-6450-42E1-B1FF-F336488A683A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:alpha:*:*:*:*:*", - "matchCriteriaId": "D97FA0F5-6A53-4E3A-BFCF-1AFF4B83CB37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*", - "matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:alpha:*:*:*:*:*", - "matchCriteriaId": "C79E6858-BB9C-4229-9DBE-8DA8627D10A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", - "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", - "matchCriteriaId": "403945FA-8676-4D98-B903-48452B46F48F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", - "matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", - "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", - "matchCriteriaId": "6A05337E-18A5-4939-85A0-69583D9B5AD9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", - "matchCriteriaId": "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", - "matchCriteriaId": "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" } ] } @@ -216,12 +113,17 @@ "url": "http://www.kb.cert.org/vuls/id/458659", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4280", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-14xx/CVE-2001-1452.json b/CVE-2001/CVE-2001-14xx/CVE-2001-1452.json index 3d935e96fd9..99fb70d346b 100644 --- a/CVE-2001/CVE-2001-14xx/CVE-2001-1452.json +++ b/CVE-2001/CVE-2001-14xx/CVE-2001-1452.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1452", "sourceIdentifier": "cve@mitre.org", "published": "2001-08-31T04:00:00.000", - "lastModified": "2023-11-07T01:55:44.167", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:47:25.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-346" } ] } @@ -58,123 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", - "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "237D7C18-C8D6-4FDB-A160-FA17DD46A55A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*", - "matchCriteriaId": "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", - "matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "064F4E76-1B89-4FA5-97ED-64624285C014" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", - "matchCriteriaId": "089A953C-8446-4E6F-B506-430C38DF37B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", - "matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "F66DC6FF-2B3D-4718-838F-9E055E89961F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", - "matchCriteriaId": "656AE014-AEEC-46E8-A696-61FEA7932F21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", - "matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "DA267420-56C5-4697-B0AA-52932F78B24B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", - "matchCriteriaId": "93BA426E-DD51-44AC-BE78-3164670FF9E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", - "matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "363E3895-A19B-42EC-B479-765168DC0B17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", - "matchCriteriaId": "FBBBF25A-709B-4716-9894-AD82180091AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", - "matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "81B7961D-151D-4773-80CB-CCD0456BFEAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", - "matchCriteriaId": "82781A72-A34F-4668-9EE8-C203B04E3367" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", - "matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "B5CAF64E-98AA-4813-A2A2-5AC3387CF230" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", - "matchCriteriaId": "BCDFDBBA-6C4F-472A-9F4F-461C424794E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", - "matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*", - "matchCriteriaId": "CA7BA525-6DB8-4444-934A-932AFED69816" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", - "matchCriteriaId": "90CFA69B-7814-4F97-A14D-D76310065CF3" + "criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21" } ] } @@ -184,7 +96,12 @@ "references": [ { "url": "http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] }, { "url": "http://www.kb.cert.org/vuls/id/109475", @@ -198,12 +115,19 @@ "url": "http://www.securityfocus.com/bid/6791", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3675", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-00xx/CVE-2002-0051.json b/CVE-2002/CVE-2002-00xx/CVE-2002-0051.json index 18cc5348777..03868f03067 100644 --- a/CVE-2002/CVE-2002-00xx/CVE-2002-0051.json +++ b/CVE-2002/CVE-2002-00xx/CVE-2002-0051.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0051", "sourceIdentifier": "cve@mitre.org", "published": "2002-04-04T05:00:00.000", - "lastModified": "2019-04-30T14:27:13.710", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:24:03.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-667" } ] } @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", - "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8" } ] } @@ -73,19 +95,36 @@ "references": [ { "url": "http://online.securityfocus.com/archive/1/244329", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/4438", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-016", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A38", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-07xx/CVE-2002-0788.json b/CVE-2002/CVE-2002-07xx/CVE-2002-0788.json index f4b8acf83d5..c7842262344 100644 --- a/CVE-2002/CVE-2002-07xx/CVE-2002-0788.json +++ b/CVE-2002/CVE-2002-07xx/CVE-2002-0788.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0788", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2013-08-03T04:27:27.127", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:13:16.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -81,27 +103,42 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0052.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.1/hotfix/ReadMe.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.iss.net/security_center/static/9044.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, + { + "url": "http://www.osvdb.org/4363", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/bid/4702", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-14xx/CVE-2002-1484.json b/CVE-2002/CVE-2002-14xx/CVE-2002-1484.json index 2907643da26..3c916fe337b 100644 --- a/CVE-2002/CVE-2002-14xx/CVE-2002-1484.json +++ b/CVE-2002/CVE-2002-14xx/CVE-2002-1484.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1484", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-22T04:00:00.000", - "lastModified": "2008-09-05T20:30:43.313", + "lastModified": "2024-02-08T19:56:10.297", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-918" } ] } @@ -62,13 +84,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:db4web:db4web:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "AFA6CADB-FC0D-4853-8474-0D718ECC5F3A" + "criteria": "cpe:2.3:a:siemens:db4web:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "2E90A22B-1B03-4791-A7E2-119A91DD3E7D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:db4web:db4web:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2191F5E4-EC82-4DFE-8063-667363AEE3FC" + "criteria": "cpe:2.3:a:siemens:db4web:3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "3363D2BD-F44D-4414-A038-942326DADDE3" } ] } @@ -80,6 +102,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -87,6 +110,7 @@ "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0125.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -94,6 +118,7 @@ "url": "http://www.iss.net/security_center/static/10136.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] @@ -102,8 +127,11 @@ "url": "http://www.securityfocus.com/bid/5725", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1706.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1706.json index fed782793c2..e9cb7a5a1d9 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1706.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1706.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1706", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:29:21.167", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:47:29.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-347" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,78 +81,26 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*", - "matchCriteriaId": "80AEA6F5-907D-493F-AB07-971D13BC1CAD" + "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.3", + "versionEndIncluding": "12.2", + "matchCriteriaId": "31B3ECA7-7047-4964-B0DD-F1FE3A59AD60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ubr7100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE45741-2794-43AD-8ECA-3B15E21D91F0" }, { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*", - "matchCriteriaId": "655BB9C1-BA90-452E-A9C8-9B1E15B99650" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*", - "matchCriteriaId": "0A747DB2-A031-470F-8EA5-F37FBE175D18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", - "matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", - "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", - "matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", - "matchCriteriaId": "FDEF6AED-4477-4AAC-9759-1996B77DFEE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", - "matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", - "matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", - "matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", - "matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", - "matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845" + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ubr7200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "543C347E-DBAC-49A0-9BC4-5F89D575DC86" } ] } @@ -141,6 +112,7 @@ "url": "http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml", "source": "cve@mitre.org", "tags": [ + "Not Applicable", "Patch", "Vendor Advisory" ] @@ -149,12 +121,19 @@ "url": "http://www.securityfocus.com/bid/5041", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9368", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json b/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json index 6d28e67781e..61303fc54eb 100644 --- a/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json +++ b/CVE-2002/CVE-2002-17xx/CVE-2002-1796.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1796", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:32.433", + "lastModified": "2024-02-08T20:47:34.467", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-347" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,8 +81,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:hp:chaivm:*:*:*:*:*:*:*:*", - "matchCriteriaId": "AFA8AD68-F38D-4049-8124-5EFAFC5A8C4C" + "criteria": "cpe:2.3:a:hp:chaivm_ezloader:-:*:*:*:*:*:*:*", + "matchCriteriaId": "490B782C-11BF-47E2-8899-8B462D2D8AA6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A1779FF-AF54-49D7-B357-3CB62371FA21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_4500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FADCF8F9-297F-43B8-A380-D91FDB66BD98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_4550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6EEF0E42-3082-4648-BA3A-3372763F72DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hp:laserjet_8150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4D75D04-E717-4361-9D62-08DCFF23ED9A" } ] } @@ -71,24 +120,45 @@ "url": "http://online.securityfocus.com/advisories/4317", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/9695.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.phenoelit.de/stuff/HP_Chai.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, + { + "url": "http://www.securityfocus.com/archive/1/284648", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.securityfocus.com/bid/5334", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1914.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1914.json index 325cd4e7013..1a269919507 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1914.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1914.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1914", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:50.323", + "lastModified": "2024-02-08T19:24:19.723", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-667" } ] } @@ -58,103 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b10:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A27597-6E76-44FF-9524-F1DF4100458B" + "criteria": "cpe:2.3:a:dump_project:dump:0.4:beta10:*:*:*:*:*:*", + "matchCriteriaId": "D6D40EBC-1700-4989-8D7F-A09F6DC0375F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b11:*:*:*:*:*:*:*", - "matchCriteriaId": "92DBC09C-377F-4833-8515-96E631963396" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b12:*:*:*:*:*:*:*", - "matchCriteriaId": "F7787F4F-0DB8-49B5-A915-537378811610" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b13:*:*:*:*:*:*:*", - "matchCriteriaId": "F65D4820-FFB8-4B20-B32E-2C77E72260E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b14:*:*:*:*:*:*:*", - "matchCriteriaId": "AA31FF8A-895F-48A4-BA90-263800079C44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b15:*:*:*:*:*:*:*", - "matchCriteriaId": "EEC0A662-BD59-4C55-BEF1-E1C6B6816513" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b16:*:*:*:*:*:*:*", - "matchCriteriaId": "CCD730C2-0211-4A1A-A6C5-0ABFA972F0B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b17:*:*:*:*:*:*:*", - "matchCriteriaId": "129BC29B-9B54-446B-9FCE-0AAFB078CC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b18:*:*:*:*:*:*:*", - "matchCriteriaId": "24DF26F4-C017-4063-897A-A4404D6B3E93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b19:*:*:*:*:*:*:*", - "matchCriteriaId": "FE6892AB-82AA-4EC1-B18A-2E223C5B550A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b20:*:*:*:*:*:*:*", - "matchCriteriaId": "0FD9F36C-5234-4570-872B-37C9E5FD5324" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b21:*:*:*:*:*:*:*", - "matchCriteriaId": "724B5FC9-C0F0-4536-82DF-396DD6B59C2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b22:*:*:*:*:*:*:*", - "matchCriteriaId": "1C9DFD81-2796-4D8A-B169-B0872EB057BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b23:*:*:*:*:*:*:*", - "matchCriteriaId": "A7990D91-17FC-4F08-A14E-71257D34606E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b24:*:*:*:*:*:*:*", - "matchCriteriaId": "C6EC47A0-E372-49AD-9EE3-584716ACE2A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b25:*:*:*:*:*:*:*", - "matchCriteriaId": "858BDD4B-5D02-4084-9F96-9992B2B25569" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b26:*:*:*:*:*:*:*", - "matchCriteriaId": "790FF2E9-CB24-46FD-8D06-CD11F74ECF72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b27:*:*:*:*:*:*:*", - "matchCriteriaId": "E2187AFB-B862-4205-A074-73756DEB3C3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b28:*:*:*:*:*:*:*", - "matchCriteriaId": "AB504379-0AAC-4C12-9586-5F52E58335FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dump:dump:0.4_b29:*:*:*:*:*:*:*", - "matchCriteriaId": "87B91132-C97C-45AC-9D1D-BD7650A8FA9B" + "criteria": "cpe:2.3:a:dump_project:dump:0.4:beta29:*:*:*:*:*:*", + "matchCriteriaId": "035AE381-95A6-428F-8240-0A94D2B2D9F0" } ] } @@ -162,21 +94,51 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/283033", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/21520", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-156.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.iss.net/security_center/static/9632.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-583.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/5264", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-19xx/CVE-2002-1915.json b/CVE-2002/CVE-2002-19xx/CVE-2002-1915.json index 532ff84836a..b9b6a0db82a 100644 --- a/CVE-2002/CVE-2002-19xx/CVE-2002-1915.json +++ b/CVE-2002/CVE-2002-19xx/CVE-2002-1915.json @@ -2,7 +2,7 @@ "id": "CVE-2002-1915", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:31:50.527", + "lastModified": "2024-02-08T19:24:08.650", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-667" } ] } @@ -61,26 +83,11 @@ "criteria": "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "47E02BE6-4800-4940-B269-385B66AC5077" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*", - "matchCriteriaId": "0EB09993-B837-4352-B09D-3656F62638A8" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*", - "matchCriteriaId": "0361EA35-FBD7-4E8F-8625-C8100ED7BB7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*", - "matchCriteriaId": "29EAA113-2404-4ABB-826B-3AA2AA858D02" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", @@ -96,76 +103,31 @@ "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", - "matchCriteriaId": "1E8A6564-129A-4555-A5ED-6F65C56AE7B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", - "matchCriteriaId": "237174A4-E030-4A0B-AD0B-5C463603EAA4" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", - "matchCriteriaId": "5D7F8F11-1869-40E2-8478-28B4E946D3CC" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", - "matchCriteriaId": "9062BAB5-D437-49BE-A384-39F62434B70B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", - "matchCriteriaId": "6E53C673-9D6D-42C8-A502-033E1FC28D97" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", - "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", - "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", - "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", - "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", @@ -312,13 +274,30 @@ } ], "references": [ + { + "url": "http://online.securityfocus.com/archive/1/283033", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, { "url": "http://www.iss.net/security_center/static/9633.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/5265", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2066.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2066.json index 8117825b9f7..f9e9a1daa6c 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2066.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2066.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2066", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:14.540", + "lastModified": "2024-02-08T20:13:11.917", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -59,18 +81,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jetico:bcwipe:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", "versionEndIncluding": "2.35.1", - "matchCriteriaId": "DD1BAE87-106D-498A-B8B7-93EAEBEE995D" + "matchCriteriaId": "4D4DCCCB-6358-40FE-BD1A-2AB29934B3A2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:jetico:bcwipe:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "48992FF9-0E5B-43D7-8F8E-ABBE7F948686" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:jetico:bcwipe:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5719D411-9AC0-41C9-AAFD-378F1E8B65FE" } ] } @@ -82,28 +100,47 @@ "url": "http://www.bcwipe.com/", "source": "cve@mitre.org", "tags": [ - "Patch" + "Product" ] }, { "url": "http://www.ciac.org/ciac/bulletins/m-034.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/7953.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/251565", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3912", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.seifried.org/security/advisories/kssa-003.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2067.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2067.json index 83140770a5c..3f85330534f 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2067.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2067.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2067", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:14.697", + "lastModified": "2024-02-08T20:28:24.663", "vulnStatus": "Analyzed", "descriptions": [ { @@ -18,6 +18,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,7 +73,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -65,8 +87,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:east_technologies:east-tec_eraser:2002:*:*:*:*:*:*:*", - "matchCriteriaId": "004858BD-F8BB-4E68-AF21-F0B1151FC762" + "criteria": "cpe:2.3:a:east-tec:eraser:2002:*:*:*:*:*:*:*", + "matchCriteriaId": "ABA5D086-756A-4E98-89C4-26AFA98989CA" } ] } @@ -78,25 +100,47 @@ "url": "http://www.ciac.org/ciac/bulletins/m-034.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.east-tec.com/eraser/faq.htm", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://www.iss.net/security_center/static/7953.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/251565", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3912", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.seifried.org/security/advisories/kssa-003.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2068.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2068.json index 7424ce2e59b..007279afaf9 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2068.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2068.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2068", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:14.837", + "lastModified": "2024-02-08T20:33:54.540", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sami_tolvanen:eraser:5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6CEEF219-8C61-443B-B0E2-3226FCC60A48" + "criteria": "cpe:2.3:a:tolvanen:eraser:5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "58FA752B-F21C-4A61-B688-812A8FF4E98C" } ] } @@ -71,21 +93,40 @@ "url": "http://www.ciac.org/ciac/bulletins/m-034.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/7953.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/251565", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3912", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.seifried.org/security/advisories/kssa-003.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2069.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2069.json index a779088f34e..0728df9134f 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2069.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2069.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2069", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:14.993", + "lastModified": "2024-02-08T20:33:40.353", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -58,38 +80,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:6.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "96820199-B27B-40F5-BB3E-F5826060D434" + "criteria": "cpe:2.3:a:pgp:personal_privacy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.2", + "versionEndIncluding": "6.5.8", + "matchCriteriaId": "D3A0768F-FE39-4513-8E92-5C8C3A8262B8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:6.5.1i:*:*:*:*:*:*:*", - "matchCriteriaId": "7FAE1A6C-DB2E-41BE-8497-2F71F79FB9B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:6.5.2a:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4667BD-AED7-4259-BA09-B7D67FB71FF4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:6.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6ED585EC-876B-416B-AAD2-9C2CF363F89D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:6.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "9C748703-3942-4F2D-BED7-A7CC1EB56D0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A50605E3-3955-44C8-883C-B5D7598FF8C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pgp:pgp:7.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "7991F5E4-8302-417A-81B8-BBD5D3B87BB6" + "criteria": "cpe:2.3:a:pgp:personal_privacy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndIncluding": "7.1.1", + "matchCriteriaId": "8CF5F157-D19E-4C40-9F32-B21B81113230" } ] } @@ -101,21 +102,40 @@ "url": "http://www.ciac.org/ciac/bulletins/m-034.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/7953.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/251565", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3912", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.seifried.org/security/advisories/kssa-003.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2002/CVE-2002-20xx/CVE-2002-2070.json b/CVE-2002/CVE-2002-20xx/CVE-2002-2070.json index b3377a5b2e6..fc3e788d081 100644 --- a/CVE-2002/CVE-2002-20xx/CVE-2002-2070.json +++ b/CVE-2002/CVE-2002-20xx/CVE-2002-2070.json @@ -2,7 +2,7 @@ "id": "CVE-2002-2070", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-31T05:00:00.000", - "lastModified": "2008-09-05T20:32:15.167", + "lastModified": "2024-02-08T20:35:32.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:accessdata:secureclean:3_build_2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2E99B93F-FFDE-41BA-A70E-4EB7172486AD" + "criteria": "cpe:2.3:a:accessdata:secureclean:3:build_2.0:*:*:*:*:*:*", + "matchCriteriaId": "25F329F5-9CC6-4B30-ABAC-FD54F3E78852" } ] } @@ -71,21 +93,40 @@ "url": "http://www.ciac.org/ciac/bulletins/m-034.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/7953.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/251565", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/3912", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.seifried.org/security/advisories/kssa-003.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] } diff --git a/CVE-2003/CVE-2003-01xx/CVE-2003-0174.json b/CVE-2003/CVE-2003-01xx/CVE-2003-0174.json index 3e161796c6d..3f75f3e3acd 100644 --- a/CVE-2003/CVE-2003-01xx/CVE-2003-0174.json +++ b/CVE-2003/CVE-2003-01xx/CVE-2003-0174.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0174", "sourceIdentifier": "cve@mitre.org", "published": "2003-05-12T04:00:00.000", - "lastModified": "2017-07-11T01:29:28.337", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:45:57.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-346" } ] } @@ -62,283 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*", - "matchCriteriaId": "BB113626-38E2-4C42-A6A9-4BBDA0AC4A96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*", - "matchCriteriaId": "772E3C7E-9947-414F-8642-18653BB048E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*", - "matchCriteriaId": "8D51EC29-8836-4F87-ABF8-FF7530DECBB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*", - "matchCriteriaId": "518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "440B7208-34DB-4898-8461-4E703F7EDFB7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*", - "matchCriteriaId": "3CEC8518-4DBA-43AA-90B8-279F2DD4A2DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*", - "matchCriteriaId": "3F8286F3-DF0E-4D8E-A27D-0C5182D5870C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5663579C-3AD2-4E5B-A595-C8DB984F9C26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*", - "matchCriteriaId": "B306EE13-57CF-43A6-AA72-C641C53A2A23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*", - "matchCriteriaId": "6291BEE1-73D2-4976-B065-E135880F73B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*", - "matchCriteriaId": "621C31D9-8102-4F2D-8008-B32020F0B831" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*", - "matchCriteriaId": "3FF5E9B8-62F9-4A6F-9C0C-551980981366" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "29113D8E-9618-4A0E-9157-678332082858" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*", - "matchCriteriaId": "F883CF73-CDA0-4B50-98E6-1B5DE0A4A816" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*", - "matchCriteriaId": "C6C9F200-68AC-4B45-8AFC-F604429FDF3F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "313613E9-4837-433C-90EE-84A92E8D24E5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*", - "matchCriteriaId": "1742BF2B-63C7-441D-9A01-DE65C95911D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*", - "matchCriteriaId": "D30B7C42-CEE8-4377-957C-BCCE35C071A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*", - "matchCriteriaId": "41AA1290-5039-406F-B195-3A4C018202D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*", - "matchCriteriaId": "B859D7F7-B0A6-4148-8146-F651ED3F99AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*", - "matchCriteriaId": "59EC5B1A-309A-4DE2-A197-F4DC07A8DC3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*", - "matchCriteriaId": "60CC9410-F6B8-4748-B76F-30626279028E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*", - "matchCriteriaId": "0E7D3C74-CDD2-4DFF-A331-007E1669752A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*", - "matchCriteriaId": "03FA10EA-F6E5-4A89-AC37-40FF6A147528" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*", - "matchCriteriaId": "DCC67401-C85A-4E4E-AE61-85FEBBF4346B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*", - "matchCriteriaId": "7C8E0DF6-D9C2-4DBC-9997-B5BFC6DEC9F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*", - "matchCriteriaId": "D1E1480B-2183-45AD-B63F-16DEC9BF0398" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*", - "matchCriteriaId": "1C4427AC-07C1-4765-981B-B5D86D698C2D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*", - "matchCriteriaId": "2D08345C-F945-410C-9DCB-8C358178F975" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*", - "matchCriteriaId": "8764BE36-9377-486C-9198-DF79A5A60679" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*", - "matchCriteriaId": "63EF0CEE-74A9-45C8-8AFD-77815230ACC6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*", - "matchCriteriaId": "25243FA1-7AF7-41D4-8FAD-A5AB289E120D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*", - "matchCriteriaId": "94D89730-AA61-4FC9-A6AB-0574CA51EE75" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*", - "matchCriteriaId": "5B24D34C-1F95-45C8-9A57-2D2622ED9019" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*", - "matchCriteriaId": "A7B59E7C-B059-41CD-AE33-E9623ADA12BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*", - "matchCriteriaId": "0DF1B657-C910-4BB0-828C-09B6A59D988D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*", - "matchCriteriaId": "6BD69805-D021-4DCC-9FB6-A0BEA721408A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*", - "matchCriteriaId": "72D61A9F-AC57-4DD9-9047-74BFA9BFACFC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*", - "matchCriteriaId": "C254FC5D-895D-4EFC-B9A7-74699D9FE65E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B13C07CC-F615-4F30-B532-4BF6F02F84DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*", - "matchCriteriaId": "27532639-37CD-4BD2-AE48-F741009D3449" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*", - "matchCriteriaId": "F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*", - "matchCriteriaId": "8BE3F77A-909E-4947-A808-BCAB7F96A108" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*", - "matchCriteriaId": "EED22734-8AAC-4897-BB71-438E19B8A005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA9C28F-18E6-4199-9740-FAB00563EBF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*", - "matchCriteriaId": "A4F1E3C7-0FDD-46E1-8748-6A5FF669C95C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*", - "matchCriteriaId": "C6E63313-9533-478D-ACC0-C050FBA3EACF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*", - "matchCriteriaId": "EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*", - "matchCriteriaId": "2334FD6C-444F-4042-AF6D-D654C18C9950" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*", - "matchCriteriaId": "61370032-AB21-4E93-B143-A92A342AFB1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*", - "matchCriteriaId": "C833FC19-D913-4C62-B14A-E1B3845D0275" + "criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.5.19", + "matchCriteriaId": "1B5551AA-3C06-4500-B4A1-BA69CFB296A5" } ] } @@ -350,25 +98,36 @@ "url": "ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.ciac.org/ciac/bulletins/n-084.shtml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/7442", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11860", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-17xx/CVE-2004-1703.json b/CVE-2004/CVE-2004-17xx/CVE-2004-1703.json index 6f157e47351..b35dbf4304b 100644 --- a/CVE-2004/CVE-2004-17xx/CVE-2004-1703.json +++ b/CVE-2004/CVE-2004-17xx/CVE-2004-1703.json @@ -2,8 +2,8 @@ "id": "CVE-2004-1703", "sourceIdentifier": "cve@mitre.org", "published": "2004-07-30T04:00:00.000", - "lastModified": "2017-07-11T01:31:16.433", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:46:04.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -56,11 +78,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:fusionphp:fusion_news:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "940CFBC6-9FCD-4DCF-AD30-C3F65F8CE1C6" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:fusionphp:fusion_news:3.6.1:*:*:*:*:*:*:*", @@ -74,13 +91,19 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=109122824523226&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://securitytracker.com/id?1010829", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -88,13 +111,20 @@ "url": "http://www.securityfocus.com/bid/10836", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16853", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-18xx/CVE-2004-1842.json b/CVE-2004/CVE-2004-18xx/CVE-2004-1842.json index 267fe612ca8..70a10161991 100644 --- a/CVE-2004/CVE-2004-18xx/CVE-2004-1842.json +++ b/CVE-2004/CVE-2004-18xx/CVE-2004-1842.json @@ -2,8 +2,8 @@ "id": "CVE-2004-1842", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:23.827", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:46:14.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,29 +11,51 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", - "accessComplexity": "LOW", + "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "baseScore": 6.8 }, - "baseSeverity": "HIGH", - "exploitabilityScore": 10.0, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, - "obtainOtherPrivilege": true, - "userInteractionRequired": false + "obtainOtherPrivilege": false, + "userInteractionRequired": true } ] }, @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -58,68 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "91CC84AB-0BA6-45BE-9DE8-7243FBF00EB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "23264211-2992-4222-9B96-5ABEE1332C5B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*", - "matchCriteriaId": "B7F76C32-E24D-4B62-88CE-2D23F457573B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*", - "matchCriteriaId": "F90A3E1F-0371-45C0-A165-55D94A62C3DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "F80A5D98-6C48-461F-8B96-BD32A96CDCA1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*", - "matchCriteriaId": "92F4E55E-4424-4EC8-8013-9A0FFE7D3658" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*", - "matchCriteriaId": "9DA61C83-9CE0-4B5E-A8A1-B9C5C9D74084" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8B13CCAA-839F-406D-A7F3-975B4780425A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1D375197-0087-479C-991B-964FB83644F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "70F6320E-314D-4A8F-BC9A-29F730035C68" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8EE03D77-9AA8-4DC6-936D-0459BD26B64B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*", - "matchCriteriaId": "F3E16D17-B704-4ADA-8F91-B7D96FB52909" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CA80B501-6EC3-4C8E-A83D-F08FC659CF82" + "criteria": "cpe:2.3:a:phpnuke:php-nuke:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndIncluding": "7.1", + "matchCriteriaId": "275B70ED-0416-40AC-B06F-9FF91FE14BB8" } ] } @@ -129,18 +93,35 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=108006309112075&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/11195", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/9895", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15596", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-19xx/CVE-2004-1967.json b/CVE-2004/CVE-2004-19xx/CVE-2004-1967.json index cd074245e83..329298bbd00 100644 --- a/CVE-2004/CVE-2004-19xx/CVE-2004-1967.json +++ b/CVE-2004/CVE-2004-19xx/CVE-2004-1967.json @@ -2,8 +2,8 @@ "id": "CVE-2004-1967", "sourceIdentifier": "cve@mitre.org", "published": "2004-04-25T04:00:00.000", - "lastModified": "2017-07-11T01:31:30.637", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:46:00.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -56,31 +78,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0E8D8D0-D96F-411D-8611-3381C576AE1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbb:openbb:1.0.0_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "2CE48C90-79EA-4333-97BF-8ABD0789D625" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbb:openbb:1.0.0_rc2:*:*:*:*:*:*:*", - "matchCriteriaId": "D2F986CB-1C64-4ED2-A3B6-6BA69D2B13CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbb:openbb:1.0.0_rc3:*:*:*:*:*:*:*", - "matchCriteriaId": "1713141D-40B0-4338-B697-3A077A080438" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbb:openbb:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5F50BB6B-34DD-4AA4-9361-7EF4FFB07122" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:openbb:openbb:1.0.6:*:*:*:*:*:*:*", @@ -94,19 +91,38 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=108301983206107&w=2", - "source": "cve@mitre.org" - }, - { - "url": "http://securitytracker.com/id?1009935", "source": "cve@mitre.org", "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/11481", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] }, + { + "url": "http://securitytracker.com/id?1009935", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry", + "Vendor Advisory" + ] + }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15967", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-19xx/CVE-2004-1995.json b/CVE-2004/CVE-2004-19xx/CVE-2004-1995.json index 8a516c84a45..be7eb870a0d 100644 --- a/CVE-2004/CVE-2004-19xx/CVE-2004-1995.json +++ b/CVE-2004/CVE-2004-19xx/CVE-2004-1995.json @@ -2,8 +2,8 @@ "id": "CVE-2004-1995", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2017-07-11T01:31:32.137", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:46:08.593", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:e-zone_media_inc.:fusetalk:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1DC24546-0EB6-433B-8CC6-4A2E66D66F53" + "criteria": "cpe:2.3:a:fusetalk:fusetalk:2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "57C45CEA-17E7-479D-B9D9-596FB8E9B932" } ] } @@ -69,23 +91,53 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=108377423825478&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/11555", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://securitytracker.com/id?1010080", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.osvdb.org/5895", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/10276", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16080", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-20xx/CVE-2004-2061.json b/CVE-2004/CVE-2004-20xx/CVE-2004-2061.json index 6715bf95c16..2dcfdbdf96f 100644 --- a/CVE-2004/CVE-2004-20xx/CVE-2004-2061.json +++ b/CVE-2004/CVE-2004-20xx/CVE-2004-2061.json @@ -2,8 +2,8 @@ "id": "CVE-2004-2061", "sourceIdentifier": "cve@mitre.org", "published": "2004-07-27T04:00:00.000", - "lastModified": "2017-07-11T01:31:35.840", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:56:07.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-918" } ] } @@ -58,48 +80,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.1:*:*:*:*:*:*:*", - "matchCriteriaId": "81037E77-B30F-4F43-91E8-CBBC48ECD61F" + "criteria": "cpe:2.3:a:risearch:risearch:1.0.01:*:*:*:*:*:*:*", + "matchCriteriaId": "A9939F0E-CE7C-469E-BC8E-60615728C5E2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.2:*:*:*:*:*:*:*", - "matchCriteriaId": "ADD78593-4655-4BC3-879D-E9A6AF2C1388" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4A29E933-57AF-4333-84A7-DC579C3B0F91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7EC0CB00-2971-4A18-87D8-1ED9F34F277A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.5:*:*:*:*:*:*:*", - "matchCriteriaId": "DB2EA48B-C4F7-45ED-B0AE-E8C5837F890A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9A665A23-215C-4C38-B58E-9BB2CA77D89B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.7:*:*:*:*:*:*:*", - "matchCriteriaId": "FEC603E2-F3C4-4C11-870E-4116C0962142" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch:0.99.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A32597AF-E4C2-47B4-A90E-FBBC80215F81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:risearch_software:risearch_pro:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "F01B6DBD-10CA-4666-81CB-D2F76C530C14" + "criteria": "cpe:2.3:a:risearch:risearch_pro:3.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "01E03BF3-438A-4F5C-B8A5-3DCAB5F9CA8E" } ] } @@ -109,23 +96,60 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=109095196526490&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/12173", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://securitytracker.com/id?1010788", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.osvdb.org/8265", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/8266", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/10812", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16817", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-08xx/CVE-2005-0877.json b/CVE-2005/CVE-2005-08xx/CVE-2005-0877.json index 3198594a77e..db4dccc9b18 100644 --- a/CVE-2005/CVE-2005-08xx/CVE-2005-0877.json +++ b/CVE-2005/CVE-2005-08xx/CVE-2005-0877.json @@ -2,8 +2,8 @@ "id": "CVE-2005-0877", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:26.953", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:46:18.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-346" } ] } @@ -58,108 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "838E0AFE-841C-4F8E-B474-F05B4F3BF510" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "56B390B5-446E-4082-BD3F-C9BD548F66D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3085AD0F-5800-4601-8A39-52602CBFB8EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "50065308-7EE7-4B47-AEC8-C4F57D611197" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "D79CAF47-A848-4462-AD4B-64C550739270" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2331C05A-E122-4DE4-BA65-0575D6FC1B9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "5D02A6A6-D36D-4A97-B2B2-8F9BB0B94C89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "3BB383B7-708C-4B4E-A6D2-B1835A643246" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "363C67DA-0309-48C2-A49C-4C0C145C6512" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "E8A35CB9-8D08-4187-8A4D-BAEE71FED60F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "BC961D2F-40A8-4E75-971B-5312A32B2B9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "E1187D5E-7161-40BD-B67D-82176154CD16" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "53732CE0-FBC3-4571-AB49-69C61C7BE4AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "5669B7D1-0C43-42C6-A3C0-3FF9020B29B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9054BC03-902A-4569-89FE-B765181D6AC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "BDF92F86-8083-4EF3-A42E-B05173059E67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "5D53AAC2-6A09-4AFD-A24D-EF4F78E6F173" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "BB01CC8D-650B-4EB4-9B35-E471B7728EBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "0CD3B486-1D9E-482E-9BFF-BE218ECA806F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "F5FB2501-8A36-4659-8A44-FDE030D77B7E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "669F9839-B687-43C1-9744-9E2873944BF3" + "criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21", + "matchCriteriaId": "101437BF-EF52-4F04-918F-229CB7CEDC08" } ] } @@ -167,20 +90,39 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/14691", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/12897", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19826", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-13xx/CVE-2005-1306.json b/CVE-2005/CVE-2005-13xx/CVE-2005-1306.json index e1ff8754d60..c31aa64b1d8 100644 --- a/CVE-2005/CVE-2005-13xx/CVE-2005-1306.json +++ b/CVE-2005/CVE-2005-13xx/CVE-2005-1306.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1306", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-15T04:00:00.000", - "lastModified": "2008-09-05T20:48:47.687", + "lastModified": "2024-02-08T19:55:30.277", "vulnStatus": "Analyzed", "descriptions": [ { @@ -18,6 +18,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -51,7 +73,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-611" } ] } @@ -93,6 +115,7 @@ "url": "http://www.adobe.com/support/techdocs/331710.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -101,8 +124,11 @@ "url": "http://www.securityfocus.com/bid/13962", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json b/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json index 8366f03fdd5..50785e8b640 100644 --- a/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json +++ b/CVE-2005/CVE-2005-16xx/CVE-2005-1674.json @@ -2,7 +2,7 @@ "id": "CVE-2005-1674", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-19T04:00:00.000", - "lastModified": "2008-09-05T20:49:46.403", + "lastModified": "2024-02-08T20:47:38.700", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ubertec:help_center_live:*:*:*:*:*:*:*:*", - "matchCriteriaId": "361544AA-7E0A-40C7-93A4-5ECF5C3CC6F6" + "criteria": "cpe:2.3:a:helpcenterlive:help_center_live:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DFC1DC88-215E-4C8E-AA46-20C46E048EB0" } ] } @@ -67,12 +89,22 @@ } ], "references": [ + { + "url": "http://www.gulftech.org/?node=research&article_id=00076-05172005", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/archive/1/398457/2005-05-15/2005-05-21/0", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2005/CVE-2005-17xx/CVE-2005-1744.json b/CVE-2005/CVE-2005-17xx/CVE-2005-1744.json index 3a9d15729be..c2d7b63db87 100644 --- a/CVE-2005/CVE-2005-17xx/CVE-2005-1744.json +++ b/CVE-2005/CVE-2005-17xx/CVE-2005-1744.json @@ -2,8 +2,8 @@ "id": "CVE-2005-1744", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-24T04:00:00.000", - "lastModified": "2018-10-30T16:26:16.013", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:35:25.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -58,383 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2D9AB3C0-8783-4160-AE2D-D1E5AAAA0A78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:express:*:*:*:*:*", - "matchCriteriaId": "80D90123-74BA-4A70-9A10-6980BAD270B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:win32:*:*:*:*:*", - "matchCriteriaId": "565CBD39-28D6-4A03-BECE-287083CE9FA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "BDE9282D-C32F-4D2F-81BE-75E447925A23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp1:express:*:*:*:*:*", - "matchCriteriaId": "14A085BB-27C9-488F-91F8-19625BF23B94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp1:win32:*:*:*:*:*", - "matchCriteriaId": "D1A33785-23D9-4428-B746-71FD404C09E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*", - "matchCriteriaId": "3E6644EF-C875-4005-A628-0AED7B7BB94F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp2:express:*:*:*:*:*", - "matchCriteriaId": "8556E775-D130-4658-AFE2-28188224ED54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp2:win32:*:*:*:*:*", - "matchCriteriaId": "1B92BC8B-15AB-4E9A-AC2F-DD6A2F443B36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1FDCF6AE-43DC-4AE5-9260-CA657F40BE77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*", - "matchCriteriaId": "05AFBE78-C611-4EA2-8B00-5F8B61696CBE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*", - "matchCriteriaId": "AC5439C1-D06F-44C6-94F5-2BD8598A506C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*", - "matchCriteriaId": "5DFE26B3-31F2-4FC0-854D-56EA4D08C28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*", - "matchCriteriaId": "C3B7752C-B297-480A-B3FC-948EA081670C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*", - "matchCriteriaId": "E40C38EC-ECA4-4F0C-8468-16191CDB9997" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*", - "matchCriteriaId": "63017BF8-D681-45EC-9C31-09D029F1126D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*", - "matchCriteriaId": "71892EC0-E6B1-4214-AC53-06489F711829" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*", - "matchCriteriaId": "C4FD8871-680E-40F9-85AB-417B5195D4BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*", - "matchCriteriaId": "8E0B1791-974A-4967-8CF9-33BE8183200B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*", - "matchCriteriaId": "696F52AE-FEB9-4090-872E-FDFD969F5604" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*", - "matchCriteriaId": "2B4BC3F5-BFE8-4834-B427-B6260D5B7A85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*", - "matchCriteriaId": "7B12A8B1-F78E-46B3-8872-4C6484345477" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*", - "matchCriteriaId": "DCED03B6-7565-4F53-8D85-F3391BF66988" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*", - "matchCriteriaId": "D2FE768F-363B-49BC-8410-739B164FB32E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*", - "matchCriteriaId": "CB2FB0E9-3812-49C5-94F4-3B39D5BE2EED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*", - "matchCriteriaId": "B70F0353-635F-465B-A7E5-AF2D017AB008" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*", - "matchCriteriaId": "D3DA28D0-18CC-4F99-AABB-EC7863CBD455" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*", - "matchCriteriaId": "6B091903-943F-4822-9F24-9D109B2D76A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*", - "matchCriteriaId": "CE1D6EE4-8545-4D0A-A50B-C8009F054DC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", - "matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*", - "matchCriteriaId": "8DEDDAF2-555D-4425-B4B6-65B1E9C21FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", - "matchCriteriaId": "6828CE4B-91E8-4688-977F-DC7BC21131C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", - "matchCriteriaId": "BBDB9094-78E8-4CBF-9F5F-321D5174F1EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*", - "matchCriteriaId": "9CD2BB36-AC0B-48E9-91E1-A4465896E87A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", - "matchCriteriaId": "E141AA86-C6D0-4FA8-9268-0FB0635DF9CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", - "matchCriteriaId": "6FB8930F-C6D8-40B9-8D08-751F5B47229B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*", - "matchCriteriaId": "A5C59B80-279B-45B3-9CC1-5A263681025B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*", - "matchCriteriaId": "893D9D88-43C4-4F9F-A364-0585DE6FA9E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", - "matchCriteriaId": "D59F9859-7344-43F0-9348-E57FABB9E431" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*", - "matchCriteriaId": "D2D05BAB-AB3B-466E-8301-01A41644DE77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", - "matchCriteriaId": "D34E2925-DE2A-437F-B349-BD7103F4C37E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", - "matchCriteriaId": "0A4EC87D-EF83-48C5-B516-A6A482D9F525" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*", - "matchCriteriaId": "935F28E3-9799-4EF6-AB83-62E9C214DD0D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", - "matchCriteriaId": "16E3F943-D920-4C0A-8545-5CF7D792011F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", - "matchCriteriaId": "6BBA04D4-BA2E-4495-85DE-38918A878012" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*", - "matchCriteriaId": "6C444DA3-69E3-4465-9173-85966B1162A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "74AE35FF-AC1C-435B-8CE9-F40AFFFA3A46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*", - "matchCriteriaId": "25C711BB-E7E0-41D8-985E-5DD386C54637" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:win32:*:*:*:*:*", - "matchCriteriaId": "38EFE72C-10E5-4EED-B016-D914FA52DE6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*", - "matchCriteriaId": "32E8797D-1B62-4480-A79D-0345E65699E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:express:*:*:*:*:*", - "matchCriteriaId": "071FAD20-D502-4634-852A-4CD06FE8E114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:win32:*:*:*:*:*", - "matchCriteriaId": "97E6F518-D320-4655-B698-2D1A82CA3EDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*", - "matchCriteriaId": "2FC1486C-6AC4-44F7-9015-40FD4A341C38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:express:*:*:*:*:*", - "matchCriteriaId": "AB5909DB-B2E2-4358-9D45-C225C6B02360" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:win32:*:*:*:*:*", - "matchCriteriaId": "04C3F96B-A1FF-4E3E-B059-366E176E5E19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*", - "matchCriteriaId": "5485722F-5DE4-4CD4-865F-32585537F523" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:express:*:*:*:*:*", - "matchCriteriaId": "BCB01060-2C29-4F75-8D0A-74F62E9F0A17" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*", - "matchCriteriaId": "3CCEDE54-97F3-457A-9886-5BD91C9AED2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:express:*:*:*:*:*", - "matchCriteriaId": "2269D44C-65EA-4ED0-9F03-A32AC5D44EEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E08D4CEA-9ACC-4869-BC87-3524A059914F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", - "matchCriteriaId": "ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*", - "matchCriteriaId": "A3DFE048-905E-4890-809D-F6BCEF7F83C9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*", - "matchCriteriaId": "6F5B2A06-CE19-4A57-9566-09FC1E259CDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", - "matchCriteriaId": "F7560131-A6AC-4BBB-AA2D-C7C63AB51226" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*", - "matchCriteriaId": "349036A0-B5E2-4656-8D2D-26BEE9EF9DFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*", - "matchCriteriaId": "D18E22CC-A0FC-4BC7-AD39-2645F57486C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", - "matchCriteriaId": "893C2387-03E3-4F8E-9029-BC64C64239EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*", - "matchCriteriaId": "D00633D1-4B38-48D9-B5CD-E8D66EA90599" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*", - "matchCriteriaId": "9429D939-FCC4-4BA7-90C4-BBEECE7309D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*", - "matchCriteriaId": "55661356-58E0-49D3-9C79-B4BB5EBE24CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*", - "matchCriteriaId": "1A1A59C0-31BB-4EE9-90C1-3289C94F690E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*", - "matchCriteriaId": "0653ACAC-B0D9-4381-AB23-11D24852A414" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*", - "matchCriteriaId": "107C2FC6-BC60-4817-8A21-14C81DA6DEF5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*", - "matchCriteriaId": "209CDA09-CAB2-481D-8DA0-161B670335E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:weblogic_portal:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2A220FA9-69A3-4857-A73D-287FDF0E68A1" + "criteria": "cpe:2.3:a:bea:weblogic_server:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.0", + "matchCriteriaId": "767A0007-20E7-4E77-ACA9-2A812433B509" } ] } @@ -446,20 +94,41 @@ "url": "http://dev2dev.bea.com/pub/advisory/127", "source": "cve@mitre.org", "tags": [ + "Product" + ] + }, + { + "url": "http://secunia.com/advisories/15486", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1014049", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/13717", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2005/0604", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-19xx/CVE-2005-1947.json b/CVE-2005/CVE-2005-19xx/CVE-2005-1947.json index 33cba2bd160..5e7fe52f8a7 100644 --- a/CVE-2005/CVE-2005-19xx/CVE-2005-1947.json +++ b/CVE-2005/CVE-2005-19xx/CVE-2005-1947.json @@ -2,8 +2,8 @@ "id": "CVE-2005-1947", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-09T04:00:00.000", - "lastModified": "2016-10-18T03:23:26.700", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:44:52.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -58,13 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:invision_power_services:invision_gallery:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9CA45453-5C5F-4730-9343-01CAF0F84705" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:invision_power_services:invision_gallery:1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4DB69839-3DBF-4C69-94F9-A482A683C641" + "criteria": "cpe:2.3:a:invisioncommunity:gallery:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.1", + "matchCriteriaId": "C0B937E7-778B-4D41-A5CC-B9F25961E600" } ] } @@ -74,12 +92,16 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=111834146710329&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.gulftech.org/?node=research&article_id=00079-06092005", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" diff --git a/CVE-2005/CVE-2005-20xx/CVE-2005-2059.json b/CVE-2005/CVE-2005-20xx/CVE-2005-2059.json index 7c53c049b3f..8bb059f9e4c 100644 --- a/CVE-2005/CVE-2005-20xx/CVE-2005-2059.json +++ b/CVE-2005/CVE-2005-20xx/CVE-2005-2059.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2059", "sourceIdentifier": "cve@mitre.org", "published": "2005-06-29T04:00:00.000", - "lastModified": "2016-10-18T03:24:36.117", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:44:57.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-352" } ] } @@ -58,103 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "65952A65-78AC-4239-9D15-BA850AF64598" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "9DFF7A22-25CB-4D5E-BA1B-E10E407DA515" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "094040BF-4C59-4266-9683-76C59D332F16" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F02151FE-89D6-4FB5-82E2-50A2F1046341" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "11E1B205-864C-4FAD-8891-12FBAC0E090F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "047CFF77-7616-41A2-9879-EA0E33B4922C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "6B321E2E-4AD3-4236-918A-F87804990FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2232ED2E-0323-4DBB-8540-98BD52750025" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "895472F7-D0F8-4C6A-95C6-15963652ABEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "858FAA03-DD05-472D-9F67-3089262F5E82" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8CAAB6C4-770C-4BC3-9D72-FDA7FD223CF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E5D35A71-2F85-4F33-9480-81EE3EB0CEE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "3E52E29B-9461-4D62-8CCA-6F12DEB63EC6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F82ADBA-67A1-47E8-8D09-21138BDE84AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "FD0DFCB9-3033-4509-BEDC-2B032524C4CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "124A5853-5C97-412B-B55B-7430B23565DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E0ED5EF0-FF8B-4C4B-8157-FBCBF1B34C5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "66D3CCE6-909B-46F4-AD8F-603E433C01D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "803A29EC-E63B-4F66-93E1-60698EE76011" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3159B6DF-CE17-490F-AA01-03E5D2EAC7B4" + "criteria": "cpe:2.3:a:ubbcentral:ubb.threads:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.5.1.1", + "matchCriteriaId": "B3A4DDC9-01E4-462A-A95F-774B4E31B37C" } ] } @@ -164,12 +92,17 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=111963737202040&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://www.gulftech.org/?node=research&article_id=00084-06232005", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -179,6 +112,7 @@ "url": "http://www.ubbcentral.com/boards/showflat.php/Cat/0/Number/42351/Main/42351/#Post42351", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] } diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2181.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2181.json index c1b15e892fe..0b02502a5a7 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2181.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2181.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2181", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-11T04:00:00.000", - "lastModified": "2017-07-11T01:32:47.140", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:45:06.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-347" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,13 +81,46 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:cisco:7940_router:*:*:*:*:*:*:*:*", - "matchCriteriaId": "422F7F76-4FC5-4A44-B6DE-B605D15F4EB5" - }, + "criteria": "cpe:2.3:o:cisco:ip_phone_7940_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D28EB68E-2F6D-4282-9498-2C2B9B5C8FB1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ip_phone_7940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F5699B0-45CB-45DA-A52A-FA703DED2558" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:cisco:7960_router:*:*:*:*:*:*:*:*", - "matchCriteriaId": "538B0209-D534-41F3-BC77-E9D8FBB92B9F" + "criteria": "cpe:2.3:o:cisco:ip_phone_7960_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE89E42C-CDC2-4504-9209-959412358487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:ip_phone_7960:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE8A58AD-C791-4803-91FA-7E197612A3C5" } ] } @@ -74,22 +130,35 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=112067698624686&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://pentest.tele-consulting.com/advisories/05_07_06_voip-phones.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securitytracker.com/alerts/2005/Jul/1014406.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21260", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-21xx/CVE-2005-2182.json b/CVE-2005/CVE-2005-21xx/CVE-2005-2182.json index a25331e95ed..646dd346489 100644 --- a/CVE-2005/CVE-2005-21xx/CVE-2005-2182.json +++ b/CVE-2005/CVE-2005-21xx/CVE-2005-2182.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2182", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-11T04:00:00.000", - "lastModified": "2017-07-11T01:32:47.187", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:45:02.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-347" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -58,8 +81,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:h:grandstream:budgetone:100:*:*:*:*:*:*:*", - "matchCriteriaId": "205C4C4B-5F04-4B95-8206-B1E496740804" + "criteria": "cpe:2.3:o:grandstream:bt-100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2409FF3D-5F88-4FB0-A676-1F301EFF434B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:grandstream:bt-100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0006D167-59B4-40FC-BC70-965C910C417C" } ] } @@ -69,22 +103,35 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=112067698624686&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://pentest.tele-consulting.com/advisories/05_07_06_voip-phones.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securitytracker.com/alerts/2005/Jul/1014407.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21260", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-22xx/CVE-2005-2293.json b/CVE-2005/CVE-2005-22xx/CVE-2005-2293.json index 1d85f8817b0..c720dadc3af 100644 --- a/CVE-2005/CVE-2005-22xx/CVE-2005-2293.json +++ b/CVE-2005/CVE-2005-22xx/CVE-2005-2293.json @@ -2,8 +2,8 @@ "id": "CVE-2005-2293", "sourceIdentifier": "cve@mitre.org", "published": "2005-07-18T04:00:00.000", - "lastModified": "2017-07-11T01:32:47.813", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:13:21.880", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-459" } ] } @@ -73,12 +95,26 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=112129452232307&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/15991/", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] }, { "url": "http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -87,13 +123,17 @@ "url": "http://www.red-database-security.com/advisory/oracle_formsbuilder_temp_file_issue.html", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Exploit", + "Third Party Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21343", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-41xx/CVE-2007-4103.json b/CVE-2007/CVE-2007-41xx/CVE-2007-4103.json index f877308bbfb..6053af6f723 100644 --- a/CVE-2007/CVE-2007-41xx/CVE-2007-4103.json +++ b/CVE-2007/CVE-2007-41xx/CVE-2007-4103.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4103", "sourceIdentifier": "cve@mitre.org", "published": "2007-07-31T10:17:00.000", - "lastModified": "2018-10-15T21:33:14.243", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:12:32.380", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-772" } ] } @@ -62,53 +84,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A" + "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.20", + "versionEndExcluding": "1.2.23", + "matchCriteriaId": "550ACDD4-83E9-470C-A151-51DC311B9C65" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554" + "criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndExcluding": "1.4.9", + "matchCriteriaId": "7D5AE015-73F0-450E-AAC4-D60BEE3E71A6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*", - "matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisk_appliance_developer_kit:0.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "45D880CB-7990-45D2-9AC1-FE840AD92889" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:digium:asterisknow_pre-release:beta6:*:*:*:*:*:*:*", - "matchCriteriaId": "B4BBEBF2-F8AD-447F-B10D-D9D7AFB48D9B" + "criteria": "cpe:2.3:a:digium:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.6.0", + "matchCriteriaId": "1EB3B452-3577-44C9-AD6C-14982AD5E4A2" } ] } @@ -118,38 +110,90 @@ "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=185713", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "http://ftp.digium.com/pub/asa/ASA-2007-018.pdf", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch" ] }, + { + "url": "http://osvdb.org/38197", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26274", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/29051", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://security.gentoo.org/glsa/glsa-200802-11.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securityreason.com/securityalert/2960", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/475069/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/24950", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1018472", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/2701", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-46xx/CVE-2008-4636.json b/CVE-2008/CVE-2008-46xx/CVE-2008-4636.json index d55a5fa3e0c..617e5e206a3 100644 --- a/CVE-2008/CVE-2008-46xx/CVE-2008-4636.json +++ b/CVE-2008/CVE-2008-46xx/CVE-2008-4636.json @@ -2,8 +2,8 @@ "id": "CVE-2008-4636", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-27T00:30:00.280", - "lastModified": "2018-10-30T16:27:33.217", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:34:46.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-78" } ] } @@ -63,58 +63,13 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:novell:opensuse:*:*:*:*:*:*:*:*", - "matchCriteriaId": "F9202A2E-9B01-4B25-A576-4689BC2B8D97" + "criteria": "cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*", + "matchCriteriaId": "5595E484-647C-4F85-94AB-5A4D55CD766B" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:*:*:*:*:*:*:*:*", - "matchCriteriaId": "BC4A9CAF-EC05-4822-80C4-86AB74237CA1" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:9:*:server:*:*:*:*:*", - "matchCriteriaId": "39D1A771-23F5-4C2E-A28B-938E462166D1" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:9.3:*:pro:*:*:*:*:*", - "matchCriteriaId": "117E9011-2CFC-4F2D-A0A2-175C0B029641" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:10:*:desktop:*:*:*:*:*", - "matchCriteriaId": "4CDD806C-BED4-44E3-B315-C271DC61F824" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:10:*:server:*:*:*:*:*", - "matchCriteriaId": "72AB025C-6212-4848-85C2-9325709BA2C6" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "92FB0F1B-80B4-47F9-A54C-51DB7E77CA08" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux:10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5DC9268E-4A06-4494-BE50-A3B806AD4937" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:*:*:*:*:*:*:*:*", - "matchCriteriaId": "63F46359-9B44-4F31-8FB3-EAB498D5DDE0" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:9:*:*:*:*:*:*:*", - "matchCriteriaId": "18BE709B-6EEB-489D-B982-6D0D978D1D20" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*", - "matchCriteriaId": "5C93C280-5BC4-4597-B354-7A2B7F196CF0" + "criteria": "cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5C0C136-E406-4628-994A-682E8E729B50" }, { "vulnerable": false, @@ -130,6 +85,36 @@ "vulnerable": false, "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*", + "matchCriteriaId": "FA1E7EFF-1CCA-473B-8D5C-30D59C26DC70" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", + "matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*", + "matchCriteriaId": "44320836-E2DE-4A1C-9820-AFFA087FF7FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", + "matchCriteriaId": "14DF1463-F23F-465F-8A35-D550A7438CB6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*", + "matchCriteriaId": "15E235E9-EC31-4F3F-80F7-981C720FF353" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*", + "matchCriteriaId": "02E6A767-B9A5-4054-BE70-286E0A464248" } ] }, @@ -140,13 +125,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:suse:yast2-backup:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.14.2", "versionEndIncluding": "2.16.6", - "matchCriteriaId": "7035EBC4-6836-4FAB-87F0-BE09B491479F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:suse:yast2-backup:2.14.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2498E88B-D23C-4E54-9A46-96E48C714E6A" + "matchCriteriaId": "4668731B-1AF7-48A2-A0BA-9A056E85A559" } ] } @@ -158,19 +139,43 @@ "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00003.html", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/50284", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/32832", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/32464", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46879", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-30xx/CVE-2009-3022.json b/CVE-2009/CVE-2009-30xx/CVE-2009-3022.json index c694d616ffe..35f5a42b5ed 100644 --- a/CVE-2009/CVE-2009-30xx/CVE-2009-3022.json +++ b/CVE-2009/CVE-2009-30xx/CVE-2009-3022.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3022", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-31T20:30:01.047", - "lastModified": "2017-08-17T01:31:00.727", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:47:56.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -71,101 +93,6 @@ "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:*:-:core:*:*:*:*:*", "versionEndIncluding": "1.2", "matchCriteriaId": "C8D7A923-B0C6-4660-A204-7FB68CBE78A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "619FADEB-7A2D-4928-9B12-DD67F0F721BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:-:*:*:*:*:*:*", - "matchCriteriaId": "B3EE1CDD-4E72-4033-A083-AEF17E0BFB3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:-:commercial:*:*:*:*:*", - "matchCriteriaId": "51B80A98-14EB-4F8F-BA8C-405A00A373D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:-:core:*:*:*:*:*", - "matchCriteriaId": "B2733D8A-1606-4593-8056-1F411116DC64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:a:*:*:*:*:*:*", - "matchCriteriaId": "147BE856-4EB4-466D-B315-0908C89C5851" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:a:commercial:*:*:*:*:*", - "matchCriteriaId": "CC05A9FF-B0FC-46B1-841E-D6416599CE4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:a:core:*:*:*:*:*", - "matchCriteriaId": "94D40EC9-54F0-4233-836A-725D53EB35D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "24AFBCF3-2745-4C97-9F4B-1F14E4974DDD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:-:*:*:*:*:*:*", - "matchCriteriaId": "7635F4B0-1644-485B-9CE8-595013509D4C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:-:commercial:*:*:*:*:*", - "matchCriteriaId": "4A0EB665-258A-43B1-9C2D-85B70A6BFB38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:-:core:*:*:*:*:*", - "matchCriteriaId": "D3ACFFE6-EBE6-4273-84AD-E31429820A1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:a:*:*:*:*:*:*", - "matchCriteriaId": "CE96C6B9-6542-4590-A491-BC652A75FA7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:a:commercial:*:*:*:*:*", - "matchCriteriaId": "276023C6-BA5A-402A-9241-2819A11BA33E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:a:core:*:*:*:*:*", - "matchCriteriaId": "1660C1EC-FCDD-4486-8F7E-9C7B0A9E833D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:b:*:*:*:*:*:*", - "matchCriteriaId": "CC1FC579-1201-436E-9004-B45B761F3ABA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:b:commercial:*:*:*:*:*", - "matchCriteriaId": "B4C1C2A1-4259-42EE-B34E-4D4478CEFEAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:b:core:*:*:*:*:*", - "matchCriteriaId": "B67F71C4-25D9-46D6-96E8-5B0F26CF43A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0D033C8-41ED-4FD1-88F1-0D031BE627EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.2:-:*:*:*:*:*:*", - "matchCriteriaId": "D498BEE6-824C-4C5A-8D00-1E7E8DC139B5" } ] } @@ -175,22 +102,49 @@ "references": [ { "url": "http://jvn.jp/en/jp/JVN68640473/index.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000058.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://osvdb.org/57425", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36458", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://www.bingo-cms.jp/security/jvn68640473.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52838", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-35xx/CVE-2009-3520.json b/CVE-2009/CVE-2009-35xx/CVE-2009-3520.json index c08d4c01b5f..23d8f956f80 100644 --- a/CVE-2009/CVE-2009-35xx/CVE-2009-3520.json +++ b/CVE-2009/CVE-2009-35xx/CVE-2009-3520.json @@ -2,7 +2,7 @@ "id": "CVE-2009-3520", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-01T15:30:00.420", - "lastModified": "2009-10-01T15:30:00.420", + "lastModified": "2024-02-08T20:48:01.457", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jean-michel_wyttenbach:cmsphp:0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "259A491F-5F57-4E64-A95C-52AEC56451C6" + "criteria": "cpe:2.3:a:cmsphp_project:cmsphp:0.21:*:*:*:*:*:*:*", + "matchCriteriaId": "E180220B-E6A7-4D9A-8B60-62176850E077" } ] } @@ -75,8 +97,17 @@ "url": "http://packetstormsecurity.org/0909-exploits/cmsphp-xsrf.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/36075", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-37xx/CVE-2009-3759.json b/CVE-2009/CVE-2009-37xx/CVE-2009-3759.json index 7d61f922b3d..3fdaad9ad30 100644 --- a/CVE-2009/CVE-2009-37xx/CVE-2009-3759.json +++ b/CVE-2009/CVE-2009-37xx/CVE-2009-3759.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3759", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-22T17:30:00.517", - "lastModified": "2017-09-19T01:29:45.937", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:48:04.980", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:citrix:xencenterweb:*:*:*:*:*:*:*:*", - "matchCriteriaId": "CA67DCE8-9246-467B-872C-FF9518EF94CA" + "criteria": "cpe:2.3:a:citrix:xencenterweb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "017F01DD-E95A-4073-9AA1-69A55786ABA3" } ] } @@ -73,40 +95,64 @@ "references": [ { "url": "http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1022520", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.exploit-db.com/exploits/9106", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/504764", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securityfocus.com/bid/35592", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1814", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51576", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-16xx/CVE-2010-1637.json b/CVE-2010/CVE-2010-16xx/CVE-2010-1637.json index e2ed21f5907..5065070b253 100644 --- a/CVE-2010/CVE-2010-16xx/CVE-2010-1637.json +++ b/CVE-2010/CVE-2010-16xx/CVE-2010-1637.json @@ -2,8 +2,8 @@ "id": "CVE-2010-1637", "sourceIdentifier": "secalert@redhat.com", "published": "2010-06-22T17:30:01.103", - "lastModified": "2012-02-14T03:55:38.273", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:56:01.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-918" } ] } @@ -65,451 +87,78 @@ "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.4.20", "matchCriteriaId": "4C85CDDA-ED8F-4878-807D-D725E83354F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2C2F0267-47D5-436F-B9F6-505CEC582AD3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "565E131D-56A9-46AB-800D-12B097FE3B7B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4FAB6F43-2DAE-4E02-8F0A-EE4D4FB3E005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "86DB6243-3A4A-419E-B6C5-D61F5B0A1E7F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A2805F37-B8E6-4647-9E90-50763C7E4952" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "284E543F-6AC3-45CD-8448-3A1D4D3DD469" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6C7E957E-81C0-4FA3-9944-5E514874BED8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:*", - "matchCriteriaId": "8FF0DACB-F875-448B-86DF-D40531A2A762" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:*", - "matchCriteriaId": "651432C3-1EE9-4BBA-A1CF-DCC9F19954D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E11C84D0-13B5-4298-B9F3-BF5C6F927793" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:*", - "matchCriteriaId": "DEE72FA1-E635-436B-A650-A8D4040925B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:*", - "matchCriteriaId": "512F2AB5-EB24-4846-B924-377D040C131A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "25F42A76-BF06-4DA9-8667-0E81D17B5B9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:*", - "matchCriteriaId": "02410BAB-C1D7-4883-A27B-C13A72707CE0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre2:*:*:*:*:*:*:*", - "matchCriteriaId": "8509AAEE-225C-4907-884D-F9796ACA40F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DD41781D-1F7E-43A7-AD59-ADFE1D04D825" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "78650B7E-9638-46FF-9656-38E8DFE3FA93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "94CBBB8E-E0AB-4F7B-A55E-F7BD5F83EAAB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4C1E1172-9D9E-439E-BD4B-4EF372344F59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5EBF40C5-6272-427C-97A1-3CE3B1D47B12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DB15C5DD-2D76-47ED-883C-D1901B96F391" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre1:*:*:*:*:*:*:*", - "matchCriteriaId": "E3E249ED-76DA-44B3-A3A7-788F4B1A19DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre2:*:*:*:*:*:*:*", - "matchCriteriaId": "ABD0A21F-CD80-4B01-B5D3-9B2281E4F143" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre3:*:*:*:*:*:*:*", - "matchCriteriaId": "BA516843-2A45-4705-9669-4B719F722192" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6DA068C0-8067-4A94-9F74-0D1DACF9A9EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "49F37AD5-120E-4FEA-ADA5-F6C3434B9BA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C059835E-8FD9-40DF-BA6F-7E313E49F511" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5E28A825-56F4-4EC5-9D62-661C0F4B477F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "545CD944-7C64-49E3-A32E-3388B5F3ECF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A55A98B3-34ED-4A90-BB78-50CB56B1B51F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9F7F3531-E0EE-48AA-BCB4-872BEB853531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CC5143ED-D4C5-4830-9C96-0B54D03679CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9B765AEC-09E9-456C-8B57-09927E55D119" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0AAFC3B0-DCE3-4190-B279-E095C666FA34" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "9291A565-0BD6-4B5E-B45F-9DE65AB8159D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B6F53A84-FC66-4963-A728-7285F63D4761" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "69A941FF-423E-49C5-AE1F-FE7ED016CA3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:rc1:*:*:*:*:*:*", - "matchCriteriaId": "75E2349D-4B4C-469C-82CE-09C4B526BCFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B34FDB1D-881B-4343-A76E-F23B93A0469A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "052914F8-B52C-4AB4-8F85-68D788B588C9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "617C554F-8E7D-4F8A-AF63-C193934C8215" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "15F11950-A2E4-4F57-BF87-57788B841A21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8F886B99-E996-4BF7-9BE3-14A6713A997F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "65801122-2E5D-4244-9D37-5483F5C731F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5A29559D-0DB8-40C8-A6E6-4F37DDD27571" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "026730B8-3919-4100-8607-C640ADBDD662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D4D1297B-EE36-46E2-8722-34F385A54751" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2C179A3C-8C8C-429B-BACA-8ADAE4170465" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "9C3A6CFE-CFA4-4B48-9738-063A2B1025FE" - }, + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc2a:*:*:*:*:*:*", - "matchCriteriaId": "2664D22F-B0E6-48AB-BBBA-C653C1AF77A3" + "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", + "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0-r1:*:*:*:*:*:*:*", - "matchCriteriaId": "5F6B4BA8-1379-44CF-B87D-9DA66B5F2484" + "criteria": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", + "matchCriteriaId": "E44669D7-6C1E-4844-B78A-73E253A7CC17" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4AD31177-05BB-4623-AED7-765DB7E44E47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "20247A22-9AB9-4BCE-BF28-350B52FBC62D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r1:*:*:*:*:*:*:*", - "matchCriteriaId": "AB0ABD26-2EA3-4884-BA0B-FFB88177CFDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r2:*:*:*:*:*:*:*", - "matchCriteriaId": "CCC479F3-6F3B-46CB-9D28-2DB7D76FDAE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r3:*:*:*:*:*:*:*", - "matchCriteriaId": "8EDC2C56-E977-452F-9263-541091356B67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r4:*:*:*:*:*:*:*", - "matchCriteriaId": "B743DEC2-1ED2-4CAC-87F4-4EFDF16159FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r5:*:*:*:*:*:*:*", - "matchCriteriaId": "5CCE37B1-932D-4A4A-B4CA-056E26D78659" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "79E6734C-EE1C-40B6-9759-15298707A6F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:r3:*:*:*:*:*:*", - "matchCriteriaId": "F66D66B1-992E-4EE0-A189-0974B96FE721" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "70484027-647C-47DF-85FD-3323F4685613" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*", - "matchCriteriaId": "CD4071B2-3D4F-4755-98B1-E28CEB05EA8B" - }, + "criteria": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", + "matchCriteriaId": "A2D59BD0-43DE-4E58-A057-640AB98359A6" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*", - "matchCriteriaId": "C4AAFE2B-77AB-4AC3-A22C-C3C256E2E45A" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "5472AEFC-EA25-49B1-AA2B-8405099B4FBE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "BF6591E5-5F36-4663-85A6-9D870FD49FC7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "03D847B0-DE1D-49D7-9ED4-30C0A82209AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "D062B70A-E5FF-403B-8BD1-777D6462B7CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "4D4CFD4D-EAC3-4325-A87F-9D5F4C513208" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:rc1:*:*:*:*:*:*", - "matchCriteriaId": "A53D0058-6216-4136-8F0A-A6B4AD475DA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3A884536-4D27-4350-B815-AB4E625879DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:rc1:*:*:*:*:*:*", - "matchCriteriaId": "4429B95B-273A-45F3-A066-9AF548AC3FC0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "BD89F143-EEBF-472D-9653-E7534F5799FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "796C453E-D59A-4988-BD91-24F31646D8FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8.4fc6:*:*:*:*:*:*:*", - "matchCriteriaId": "2A901766-B49B-4983-98AB-880B333C284B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B9851AD9-5093-4482-A632-487C6D104C9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*", - "matchCriteriaId": "5BA5BA42-F53A-4E0D-B04C-D70D2291E408" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "18AF3BC6-E33B-44BD-A2F6-A7F5244AA4FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*", - "matchCriteriaId": "77776503-3258-400D-8404-233EAFA940AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "682BC5E2-F2C5-4B6F-8EF0-E05152BB9B12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "ABC24558-B7C1-4DE7-BC24-AF092DF0DE97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "537E4C91-91F9-469B-BF7D-5B05624D637A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "0986D113-C9F9-4645-8968-D165EC6B917D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:rc1:*:*:*:*:*:*", - "matchCriteriaId": "3893B3D9-BAA3-4FCD-BC58-C4B664E688B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B8608AE1-7930-47CF-B2E8-9E86E2FB5A20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "34EB1B08-4377-4496-A278-19616238900F" - }, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6.8", + "matchCriteriaId": "BD16A092-B263-400F-BD7E-94DEB5D57EDB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "5BF9DF8F-368B-44A0-9258-49298E41E0E2" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "14735797-F6A9-42C8-9E05-9A427AD69EFD" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.44:*:*:*:*:*:*:*", - "matchCriteriaId": "A0C44025-C79D-4791-8EF6-3E26786E194E" + "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" } ] } @@ -517,25 +166,54 @@ } ], "references": [ + { + "url": "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/40307", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://squirrelmail.org/security/issue/2010-06-21", @@ -547,7 +225,10 @@ }, { "url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Product" + ] }, { "url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951", @@ -558,46 +239,78 @@ }, { "url": "http://support.apple.com/kb/HT5130", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:120", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2010/05/25/3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2010/05/25/9", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2010/06/21/1", "source": "secalert@redhat.com", "tags": [ + "Mailing List", "Patch" ] }, { "url": "http://www.securityfocus.com/bid/40291", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/40307", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1535", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1536", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1554", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json b/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json index accd749cdf9..29062f7e663 100644 --- a/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json +++ b/CVE-2015/CVE-2015-83xx/CVE-2015-8315.json @@ -2,8 +2,8 @@ "id": "CVE-2015-8315", "sourceIdentifier": "cve@mitre.org", "published": "2017-01-23T21:59:00.423", - "lastModified": "2023-11-07T02:28:23.407", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T20:34:07.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-1333" } ] } @@ -106,6 +106,7 @@ "url": "http://www.securityfocus.com/bid/96389", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -114,6 +115,7 @@ "url": "https://nodesecurity.io/advisories/46", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Mitigation", "Vendor Advisory" @@ -121,7 +123,10 @@ }, { "url": "https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-40xx/CVE-2016-4029.json b/CVE-2016/CVE-2016-40xx/CVE-2016-4029.json index a8bf8b1a489..07cfd2a306e 100644 --- a/CVE-2016/CVE-2016-40xx/CVE-2016-4029.json +++ b/CVE-2016/CVE-2016-40xx/CVE-2016-4029.json @@ -2,9 +2,9 @@ "id": "CVE-2016-4029", "sourceIdentifier": "cve@mitre.org", "published": "2016-08-07T16:59:00.143", - "lastModified": "2017-11-04T01:29:19.617", - "vulnStatus": "Modified", - "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", + "lastModified": "2024-02-08T19:56:14.470", + "vulnStatus": "Analyzed", + "evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)", "descriptions": [ { "lang": "en", @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -71,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-285" + "value": "CWE-918" } ] } @@ -86,8 +86,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.4.4", - "matchCriteriaId": "8EAA1EC6-E3AC-48C9-85FE-F43535053480" + "versionEndExcluding": "4.5", + "matchCriteriaId": "47CE68DF-6C7B-4CD4-BFA7-DE2D97EC961F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ] } @@ -104,22 +119,33 @@ }, { "url": "http://www.debian.org/security/2016/dsa-3681", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securitytracker.com/id/1036594", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://core.trac.wordpress.org/query?status=closed&milestone=4.5", "source": "cve@mitre.org", "tags": [ - "Release Notes" + "Patch" ] }, { "url": "https://wpvulndb.com/vulnerabilities/8473", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-119xx/CVE-2019-11930.json b/CVE-2019/CVE-2019-119xx/CVE-2019-11930.json index 3a1a5c76024..9b8826dc728 100644 --- a/CVE-2019/CVE-2019-119xx/CVE-2019-11930.json +++ b/CVE-2019/CVE-2019-119xx/CVE-2019-11930.json @@ -2,7 +2,7 @@ "id": "CVE-2019-11930", "sourceIdentifier": "cve-assign@fb.com", "published": "2019-12-04T17:16:43.087", - "lastModified": "2020-10-06T18:23:58.057", + "lastModified": "2024-02-08T20:12:24.120", "vulnStatus": "Analyzed", "descriptions": [ { @@ -152,8 +152,7 @@ "url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36", "source": "cve-assign@fb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -167,7 +166,7 @@ "url": "https://www.facebook.com/security/advisories/cve-2019-11930", "source": "cve-assign@fb.com", "tags": [ - "Third Party Advisory" + "Vendor Advisory" ] } ] diff --git a/CVE-2019/CVE-2019-120xx/CVE-2019-12041.json b/CVE-2019/CVE-2019-120xx/CVE-2019-12041.json index 92173799667..331641f6f26 100644 --- a/CVE-2019/CVE-2019-120xx/CVE-2019-12041.json +++ b/CVE-2019/CVE-2019-120xx/CVE-2019-12041.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12041", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-13T13:29:02.243", - "lastModified": "2019-05-13T18:42:09.117", + "lastModified": "2024-02-08T20:28:10.007", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-1333" } ] } @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DA15E926-6695-47EF-9683-D55988A8C0FD" + "criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:node.js:*:*", + "matchCriteriaId": "EBD1C278-8330-40CA-B276-F646A2419E00" } ] } @@ -98,6 +98,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] } diff --git a/CVE-2019/CVE-2019-162xx/CVE-2019-16215.json b/CVE-2019/CVE-2019-162xx/CVE-2019-16215.json index fb7650bce02..4843f9420f1 100644 --- a/CVE-2019/CVE-2019-162xx/CVE-2019-16215.json +++ b/CVE-2019/CVE-2019-162xx/CVE-2019-16215.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16215", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-18T12:15:10.910", - "lastModified": "2019-09-18T18:27:18.170", + "lastModified": "2024-02-08T20:28:52.407", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-1333" } ] } diff --git a/CVE-2020/CVE-2020-214xx/CVE-2020-21469.json b/CVE-2020/CVE-2020-214xx/CVE-2020-21469.json index 2ed96b00102..972a333c921 100644 --- a/CVE-2020/CVE-2020-214xx/CVE-2020-21469.json +++ b/CVE-2020/CVE-2020-214xx/CVE-2020-21469.json @@ -2,8 +2,8 @@ "id": "CVE-2020-21469", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:13.257", - "lastModified": "2023-11-07T03:19:43.853", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:25:02.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 4.4, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 0.8, "impactScore": 3.6 } ] @@ -75,11 +75,17 @@ }, { "url": "https://www.postgresql.org/message-id/flat/CAA8ZSMqAHDCgo07hqKoM5XJaoQy6Vv76O7966agez4ffyQktkA%40mail.gmail.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.postgresql.org/support/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-52xx/CVE-2020-5243.json b/CVE-2020/CVE-2020-52xx/CVE-2020-5243.json index c75da6d3c3c..7b9f5977920 100644 --- a/CVE-2020/CVE-2020-52xx/CVE-2020-5243.json +++ b/CVE-2020/CVE-2020-52xx/CVE-2020-5243.json @@ -2,7 +2,7 @@ "id": "CVE-2020-5243", "sourceIdentifier": "security-advisories@github.com", "published": "2020-02-21T00:15:10.960", - "lastModified": "2020-02-25T19:44:54.697", + "lastModified": "2024-02-08T20:12:57.650", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-1333" } ] }, @@ -114,9 +114,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:uap-core_project:uap-core:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:uap-core_project:uap-core:*:*:*:*:*:node.js:*:*", "versionEndExcluding": "0.7.3", - "matchCriteriaId": "E93CB3F6-D527-456D-ADDB-C3D911A1815D" + "matchCriteriaId": "01D32B5D-738D-4349-B7E5-18C9F1B66947" } ] } @@ -128,8 +128,7 @@ "url": "https://github.com/ua-parser/uap-core/commit/0afd61ed85396a3b5316f18bfd1edfaadf8e88e1", "source": "security-advisories@github.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { diff --git a/CVE-2021/CVE-2021-213xx/CVE-2021-21317.json b/CVE-2021/CVE-2021-213xx/CVE-2021-21317.json index 6ab7ac05ae9..3fc422e4bc9 100644 --- a/CVE-2021/CVE-2021-213xx/CVE-2021-21317.json +++ b/CVE-2021/CVE-2021-213xx/CVE-2021-21317.json @@ -2,7 +2,7 @@ "id": "CVE-2021-21317", "sourceIdentifier": "security-advisories@github.com", "published": "2021-02-16T18:15:12.583", - "lastModified": "2021-02-26T14:26:49.740", + "lastModified": "2024-02-08T20:29:02.863", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,8 +128,7 @@ "url": "https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c", "source": "security-advisories@github.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { diff --git a/CVE-2021/CVE-2021-412xx/CVE-2021-41232.json b/CVE-2021/CVE-2021-412xx/CVE-2021-41232.json index 0bc13145aa7..40c416c54c1 100644 --- a/CVE-2021/CVE-2021-412xx/CVE-2021-41232.json +++ b/CVE-2021/CVE-2021-412xx/CVE-2021-41232.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41232", "sourceIdentifier": "security-advisories@github.com", "published": "2021-11-02T18:15:08.710", - "lastModified": "2021-11-04T20:59:07.707", + "lastModified": "2024-02-08T20:35:02.133", "vulnStatus": "Analyzed", "descriptions": [ { @@ -88,6 +88,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-116" + }, { "lang": "en", "value": "CWE-74" @@ -132,8 +136,7 @@ "url": "https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1", "source": "security-advisories@github.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27223.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27223.json index 1866cfbf24c..d41746c13eb 100644 --- a/CVE-2022/CVE-2022-272xx/CVE-2022-27223.json +++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27223.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27223", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-16T00:15:09.993", - "lastModified": "2023-01-19T03:24:11.227", + "lastModified": "2024-02-08T20:50:26.827", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,7 +77,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -86,15 +85,57 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.18", + "versionEndExcluding": "4.9.304", + "matchCriteriaId": "D258D5FB-D90C-404C-A81D-71B02C571C58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.269", + "matchCriteriaId": "F0F577D3-EFEA-42CF-80AA-905297529D7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.232", + "matchCriteriaId": "EF11C6DC-8B9A-4A37-B1E6-33B68F5366ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.182", + "matchCriteriaId": "EE74CED8-43BF-4060-9578-93A09735B4E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.103", + "matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.26", + "matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "5.16.12", - "matchCriteriaId": "FD5AEF0D-5C5B-4ABC-BC82-E0A5C7822EC0" + "matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -299,7 +340,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42745.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42745.json index 49192c4855f..7c0d48a649c 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42745.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42745.json @@ -2,12 +2,16 @@ "id": "CVE-2022-42745", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-11-03T20:15:32.387", - "lastModified": "2022-11-05T00:32:34.860", + "lastModified": "2024-02-08T19:55:44.273", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE." + }, + { + "lang": "es", + "value": "CandidATS versi\u00f3n 3.0.0 permite a un atacante externo leer archivos arbitrarios del servidor. Esto es posible porque la aplicaci\u00f3n es vulnerable a XXE." } ], "metrics": { @@ -41,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-776" + "value": "CWE-611" } ] } @@ -55,8 +59,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*", - "matchCriteriaId": "49FA43A5-7FB5-4E3A-8530-06C2BC31B078" + "criteria": "cpe:2.3:a:auieosoftware:candidats:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "293D06E8-8EC0-478D-8279-7BEB2628D165" } ] } diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json index 8b492059440..f3d9b183c22 100644 --- a/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json +++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20180.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20180", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-07-07T20:15:09.943", - "lastModified": "2024-01-25T17:15:32.870", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:07:44.363", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json index 9a44f00e87d..c80f086f128 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20221.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20221", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-08-16T22:15:11.687", - "lastModified": "2024-01-25T17:15:38.170", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:07:51.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37621.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37621.json index fa1d3ba053e..1a4f4018771 100644 --- a/CVE-2023/CVE-2023-376xx/CVE-2023-37621.json +++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37621.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37621", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T09:15:56.177", - "lastModified": "2024-02-08T18:45:52.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-08T19:04:55.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 3.6 + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38273.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38273.json index b1372209422..cc2d07b60e1 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38273.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38273.json @@ -2,16 +2,40 @@ "id": "CVE-2023-38273", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T15:15:09.270", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T19:35:12.703", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "IBM Cloud Pak System 2.3.1.1, 2.3.2.0, and 2.3.3.7 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 260733." + }, + { + "lang": "es", + "value": "IBM Cloud Pak System 2.3.1.1, 2.3.2.0 y 2.3.3.7 utiliza una configuraci\u00f3n de bloqueo de cuenta inadecuada que podr\u00eda permitir a un atacante remoto utilizar fuerza bruta en las credenciales de la cuenta. ID de IBM X-Force: 260733." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -46,14 +70,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3.3.0", + "versionEndIncluding": "2.3.3.6", + "matchCriteriaId": "A28FDA5D-1220-4585-97AF-A9349CFB3971" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_system:2.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D9DA5D-895C-45D9-909C-9C04454A1BB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_system:2.3.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F5153F3A-2257-42A5-AA87-4387D374C7BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "1A41D520-7446-441A-B488-5B98CF7CA8D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260733", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7105357", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40547.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40547.json index 14faeb6be5f..49b31703533 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40547.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40547.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40547", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-25T16:15:07.717", - "lastModified": "2024-02-08T17:15:10.703", - "vulnStatus": "Modified", + "lastModified": "2024-02-08T19:25:40.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 + "exploitabilityScore": 1.6, + "impactScore": 6.0 }, { "source": "secalert@redhat.com", @@ -63,6 +63,10 @@ "source": "nvd@nist.gov", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-346" + }, { "lang": "en", "value": "CWE-787" diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47142.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47142.json index 54f12a6f402..057e9eb8e93 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47142.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47142.json @@ -2,16 +2,40 @@ "id": "CVE-2023-47142", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T14:15:54.013", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T19:32:57.063", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 could allow an attacker on the organization's local network to escalate their privileges due to unauthorized API access. IBM X-Force ID: 270267." + }, + { + "lang": "es", + "value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 a 7.3.0.10 podr\u00eda permitir que un atacante en la red local de la organizaci\u00f3n escale sus privilegios debido a un acceso API no autorizado. ID de IBM X-Force: 270267." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -46,14 +70,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndIncluding": "7.3.0.10", + "matchCriteriaId": "3E196A63-7C6F-40A1-B04D-CB074A57BF67" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270267", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7105139", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47143.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47143.json index 53df546f5e3..6d2ce602f7a 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47143.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47143.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47143", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T13:15:08.253", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T20:00:13.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +80,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndExcluding": "7.3.0.11", + "matchCriteriaId": "17C50B97-4260-4C1E-9B20-0E312D22EEA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270270", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7105139", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47144.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47144.json index 2d0f28f2d77..d0efdf45890 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47144.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47144.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47144", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T13:15:08.480", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T20:01:15.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndExcluding": "7.3.0.11", + "matchCriteriaId": "17C50B97-4260-4C1E-9B20-0E312D22EEA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270271", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7105139", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47148.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47148.json index a0201bbb6ca..0a4cf2daba7 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47148.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47148.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47148", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T13:15:08.687", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T19:58:30.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.15.3", + "matchCriteriaId": "D7B7F435-1A3E-445F-86E3-18D16B343C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270599", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7096482", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51939.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51939.json index 64a239651d5..c15d3cae21b 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51939.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51939.json @@ -2,27 +2,96 @@ "id": "CVE-2023-51939", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T07:15:08.450", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T20:11:36.137", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue in the cp_bbs_sig function in relic/src/cp/relic_cp_bbs.c of Relic relic-toolkit 0.6.0 allows a remote attacker to obtain sensitive information and escalate privileges via the cp_bbs_sig function." + }, + { + "lang": "es", + "value": "Un problema en la funci\u00f3n cp_bbs_sig en relic/src/cp/relic_cp_bbs.c de Relic relic-toolkit 0.6.0 permite a un atacante remoto obtener informaci\u00f3n confidencial y escalar privilegios a trav\u00e9s de la funci\u00f3n cp_bbs_sig." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:relic_project:relic:0.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E51401A1-E232-4848-8A65-FF9057152978" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/liang-junkai/1b59487c0f7002fa5da98035b53e409f", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/liang-junkai/Relic-bbs-fault-injection", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mitigation", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://github.com/relic-toolkit/relic/issues/284", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0242.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0242.json new file mode 100644 index 00000000000..26c8fb6d030 --- /dev/null +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0242.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-0242", + "sourceIdentifier": "productsecurity@jci.com", + "published": "2024-02-08T20:15:52.407", + "lastModified": "2024-02-08T20:15:52.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Under certain circumstances IQ Panel4 and IQ4 Hub panel software prior to version 4.4.2 could allow unauthorized access to settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@jci.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@jci.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-039-01", + "source": "productsecurity@jci.com" + }, + { + "url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories", + "source": "productsecurity@jci.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0909.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0909.json index 1accfb55078..8d9c9769159 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0909.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0909.json @@ -2,16 +2,40 @@ "id": "CVE-2024-0909", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-03T06:15:48.057", - "lastModified": "2024-02-05T02:09:43.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T20:07:51.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Anonymous Restricted Content plugin for WordPress is vulnerable to information disclosure in all versions up to, and including, 1.6.2. This is due to insufficient restrictions through the REST API on the posts/pages that protections are being place on. This makes it possible for unauthenticated attackers to access protected content." + }, + { + "lang": "es", + "value": "El complemento de Anonymous Restricted Content para WordPress es vulnerable a la divulgaci\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.6.2 incluida. Esto se debe a restricciones insuficientes a trav\u00e9s de la API REST en las publicaciones/p\u00e1ginas en las que se aplican protecciones. Esto hace posible que atacantes no autenticados accedan a contenido protegido." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -34,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tarassych:anonymous_restricted_content:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.6.2", + "matchCriteriaId": "A3C44DCE-78DA-4218-B10B-F427495F9727" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030199%40anonymous-restricted-content&new=3030199%40anonymous-restricted-content&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030608%40anonymous-restricted-content&new=3030608%40anonymous-restricted-content&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f478ff7c-7193-4c59-a84f-c7cafff9b6c0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1329.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1329.json new file mode 100644 index 00000000000..3ed5bcb4560 --- /dev/null +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1329.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-1329", + "sourceIdentifier": "security@hashicorp.com", + "published": "2024-02-08T20:15:52.643", + "lastModified": "2024-02-08T20:15:52.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. Fixed in Nomad 1.7.4, 1.6.7, 1.5.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack", + "source": "security@hashicorp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22795.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22795.json new file mode 100644 index 00000000000..64f4b3a3785 --- /dev/null +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22795.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-22795", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-08T19:15:08.110", + "lastModified": "2024-02-08T19:15:08.110", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 allows a local attacker to escalate privileges via the Recheck Compliance Status component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Hagrid29/aea0dc35a1e87813dbbb7b317853d023", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Hagrid29/ForeScout-SecureConnector-EoP", + "source": "cve@mitre.org" + }, + { + "url": "https://www.forescout.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22836.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22836.json new file mode 100644 index 00000000000..f31df2b6b35 --- /dev/null +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22836.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-22836", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-08T20:15:52.830", + "lastModified": "2024-02-08T20:15:52.830", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability exists in Akaunting v3.1.3 and earlier. An attacker can manipulate the company locale when installing an app to execute system commands on the hosting server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://akaunting.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/akaunting/akaunting/releases/tag/3.1.4", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/u32i/cve/tree/main/CVE-2024-22836", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23660.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23660.json new file mode 100644 index 00000000000..a7d73987903 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23660.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-23660", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-08T20:15:52.887", + "lastModified": "2024-02-08T20:15:52.887", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Binance Trust Wallet app for iOS in commit 3cd6e8f647fbba8b5d8844fcd144365a086b629f, git tag 0.0.4 misuses the trezor-crypto library and consequently generates mnemonic words for which the device time is the only entropy source, leading to economic losses, as exploited in the wild in July 2023. An attacker can systematically generate mnemonics for each timestamp within an applicable timeframe, and link them to specific wallet addresses in order to steal funds from those wallets." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://milksad.info/posts/research-update-5/", + "source": "cve@mitre.org" + }, + { + "url": "https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23764.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23764.json new file mode 100644 index 00000000000..ae4961c09cd --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23764.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-23764", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-08T19:15:08.180", + "lastModified": "2024-02-08T19:15:08.180", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Certain WithSecure products allow Local Privilege Escalation. This affects WithSecure Client Security 15 and later, WithSecure Server Security 15 and later, WithSecure Email and Server Security 15 and later, and WithSecure Elements Endpoint Protection 17 and later." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.withsecure.com/en/support/security-advisories", + "source": "cve@mitre.org" + }, + { + "url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-23764", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json new file mode 100644 index 00000000000..7fe510f2080 --- /dev/null +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24115.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-24115", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-08T20:15:52.933", + "lastModified": "2024-02-08T20:15:52.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in the Edit Page function of Cotonti CMS v0.9.24 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://mechaneus.github.io/CVE-PENDING-COTONTI.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-242xx/CVE-2024-24215.json b/CVE-2024/CVE-2024-242xx/CVE-2024-24215.json new file mode 100644 index 00000000000..e4c2074336b --- /dev/null +++ b/CVE-2024/CVE-2024-242xx/CVE-2024-24215.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-24215", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-08T19:15:08.233", + "lastModified": "2024-02-08T19:15:08.233", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component /cgi-bin/GetJsonValue.cgi of Cellinx NVT Web Server 5.0.0.014 allows attackers to leak configuration information via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24215", + "source": "cve@mitre.org" + }, + { + "url": "https://reference3.example.com//1.222.228.4/%2C", + "source": "cve@mitre.org" + }, + { + "url": "https://reference4.example.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json index 5a524cc5998..da6208857d0 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24388", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T10:15:08.870", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-08T20:04:04.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,68 @@ "value": "Vulnerabilidad de Cross-site scripting (XSS) en las versiones de XunRuiCMS v4.6.2 y anteriores, permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de solicitudes maliciosas manipuladas para el inicio de sesi\u00f3n en segundo plano." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.6.2", + "matchCriteriaId": "841354CA-9629-4EB7-946B-7A32F135336B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cnblogs.com/rxtycc/p/17948379", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 53ce3bbbb1f..976220a5625 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-08T19:00:32.755802+00:00 +2024-02-08T21:00:24.645079+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-08T18:53:14.107000+00:00 +2024-02-08T20:50:26.827000+00:00 ``` ### Last Data Feed Release @@ -29,49 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -237958 +237966 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `8` -* [CVE-2023-42282](CVE-2023/CVE-2023-422xx/CVE-2023-42282.json) (`2024-02-08T17:15:10.840`) -* [CVE-2023-50061](CVE-2023/CVE-2023-500xx/CVE-2023-50061.json) (`2024-02-08T18:15:08.157`) -* [CVE-2024-25189](CVE-2024/CVE-2024-251xx/CVE-2024-25189.json) (`2024-02-08T17:15:10.960`) -* [CVE-2024-25190](CVE-2024/CVE-2024-251xx/CVE-2024-25190.json) (`2024-02-08T17:15:11.013`) -* [CVE-2024-25191](CVE-2024/CVE-2024-251xx/CVE-2024-25191.json) (`2024-02-08T17:15:11.067`) -* [CVE-2024-24213](CVE-2024/CVE-2024-242xx/CVE-2024-24213.json) (`2024-02-08T18:15:08.237`) -* [CVE-2024-24321](CVE-2024/CVE-2024-243xx/CVE-2024-24321.json) (`2024-02-08T18:15:08.293`) +* [CVE-2024-22795](CVE-2024/CVE-2024-227xx/CVE-2024-22795.json) (`2024-02-08T19:15:08.110`) +* [CVE-2024-23764](CVE-2024/CVE-2024-237xx/CVE-2024-23764.json) (`2024-02-08T19:15:08.180`) +* [CVE-2024-24215](CVE-2024/CVE-2024-242xx/CVE-2024-24215.json) (`2024-02-08T19:15:08.233`) +* [CVE-2024-0242](CVE-2024/CVE-2024-02xx/CVE-2024-0242.json) (`2024-02-08T20:15:52.407`) +* [CVE-2024-1329](CVE-2024/CVE-2024-13xx/CVE-2024-1329.json) (`2024-02-08T20:15:52.643`) +* [CVE-2024-22836](CVE-2024/CVE-2024-228xx/CVE-2024-22836.json) (`2024-02-08T20:15:52.830`) +* [CVE-2024-23660](CVE-2024/CVE-2024-236xx/CVE-2024-23660.json) (`2024-02-08T20:15:52.887`) +* [CVE-2024-24115](CVE-2024/CVE-2024-241xx/CVE-2024-24115.json) (`2024-02-08T20:15:52.933`) ### CVEs modified in the last Commit -Recently modified CVEs: `23` +Recently modified CVEs: `63` -* [CVE-2002-0639](CVE-2002/CVE-2002-06xx/CVE-2002-0639.json) (`2024-02-08T18:37:46.120`) -* [CVE-2002-0391](CVE-2002/CVE-2002-03xx/CVE-2002-0391.json) (`2024-02-08T18:38:00.947`) -* [CVE-2004-2013](CVE-2004/CVE-2004-20xx/CVE-2004-2013.json) (`2024-02-08T17:59:17.197`) -* [CVE-2005-1141](CVE-2005/CVE-2005-11xx/CVE-2005-1141.json) (`2024-02-08T18:37:12.213`) -* [CVE-2005-1513](CVE-2005/CVE-2005-15xx/CVE-2005-1513.json) (`2024-02-08T18:38:11.297`) -* [CVE-2005-0102](CVE-2005/CVE-2005-01xx/CVE-2005-0102.json) (`2024-02-08T18:39:13.740`) -* [CVE-2010-1866](CVE-2010/CVE-2010-18xx/CVE-2010-1866.json) (`2024-02-08T18:38:19.200`) -* [CVE-2020-15708](CVE-2020/CVE-2020-157xx/CVE-2020-15708.json) (`2024-02-08T17:33:49.730`) -* [CVE-2022-35868](CVE-2022/CVE-2022-358xx/CVE-2022-35868.json) (`2024-02-08T18:40:59.770`) -* [CVE-2023-44312](CVE-2023/CVE-2023-443xx/CVE-2023-44312.json) (`2024-02-08T17:08:11.110`) -* [CVE-2023-44313](CVE-2023/CVE-2023-443xx/CVE-2023-44313.json) (`2024-02-08T17:13:28.083`) -* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-02-08T17:15:10.703`) -* [CVE-2023-5390](CVE-2023/CVE-2023-53xx/CVE-2023-5390.json) (`2024-02-08T17:18:46.787`) -* [CVE-2023-6258](CVE-2023/CVE-2023-62xx/CVE-2023-6258.json) (`2024-02-08T17:29:26.097`) -* [CVE-2023-50357](CVE-2023/CVE-2023-503xx/CVE-2023-50357.json) (`2024-02-08T17:40:13.563`) -* [CVE-2023-47020](CVE-2023/CVE-2023-470xx/CVE-2023-47020.json) (`2024-02-08T18:42:36.577`) -* [CVE-2023-37621](CVE-2023/CVE-2023-376xx/CVE-2023-37621.json) (`2024-02-08T18:45:52.103`) -* [CVE-2024-22200](CVE-2024/CVE-2024-222xx/CVE-2024-22200.json) (`2024-02-08T17:01:25.927`) -* [CVE-2024-21653](CVE-2024/CVE-2024-216xx/CVE-2024-21653.json) (`2024-02-08T17:33:27.273`) -* [CVE-2024-22287](CVE-2024/CVE-2024-222xx/CVE-2024-22287.json) (`2024-02-08T17:38:14.320`) -* [CVE-2024-23838](CVE-2024/CVE-2024-238xx/CVE-2024-23838.json) (`2024-02-08T18:02:03.540`) -* [CVE-2024-24834](CVE-2024/CVE-2024-248xx/CVE-2024-24834.json) (`2024-02-08T18:42:36.577`) -* [CVE-2024-24548](CVE-2024/CVE-2024-245xx/CVE-2024-24548.json) (`2024-02-08T18:53:14.107`) +* [CVE-2009-3759](CVE-2009/CVE-2009-37xx/CVE-2009-3759.json) (`2024-02-08T20:48:04.980`) +* [CVE-2010-1637](CVE-2010/CVE-2010-16xx/CVE-2010-1637.json) (`2024-02-08T19:56:01.377`) +* [CVE-2015-8315](CVE-2015/CVE-2015-83xx/CVE-2015-8315.json) (`2024-02-08T20:34:07.077`) +* [CVE-2016-4029](CVE-2016/CVE-2016-40xx/CVE-2016-4029.json) (`2024-02-08T19:56:14.470`) +* [CVE-2019-11930](CVE-2019/CVE-2019-119xx/CVE-2019-11930.json) (`2024-02-08T20:12:24.120`) +* [CVE-2019-12041](CVE-2019/CVE-2019-120xx/CVE-2019-12041.json) (`2024-02-08T20:28:10.007`) +* [CVE-2019-16215](CVE-2019/CVE-2019-162xx/CVE-2019-16215.json) (`2024-02-08T20:28:52.407`) +* [CVE-2020-21469](CVE-2020/CVE-2020-214xx/CVE-2020-21469.json) (`2024-02-08T19:25:02.497`) +* [CVE-2020-5243](CVE-2020/CVE-2020-52xx/CVE-2020-5243.json) (`2024-02-08T20:12:57.650`) +* [CVE-2021-21317](CVE-2021/CVE-2021-213xx/CVE-2021-21317.json) (`2024-02-08T20:29:02.863`) +* [CVE-2021-41232](CVE-2021/CVE-2021-412xx/CVE-2021-41232.json) (`2024-02-08T20:35:02.133`) +* [CVE-2022-42745](CVE-2022/CVE-2022-427xx/CVE-2022-42745.json) (`2024-02-08T19:55:44.273`) +* [CVE-2022-27223](CVE-2022/CVE-2022-272xx/CVE-2022-27223.json) (`2024-02-08T20:50:26.827`) +* [CVE-2023-37621](CVE-2023/CVE-2023-376xx/CVE-2023-37621.json) (`2024-02-08T19:04:55.887`) +* [CVE-2023-20180](CVE-2023/CVE-2023-201xx/CVE-2023-20180.json) (`2024-02-08T19:07:44.363`) +* [CVE-2023-20221](CVE-2023/CVE-2023-202xx/CVE-2023-20221.json) (`2024-02-08T19:07:51.023`) +* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-02-08T19:25:40.323`) +* [CVE-2023-47142](CVE-2023/CVE-2023-471xx/CVE-2023-47142.json) (`2024-02-08T19:32:57.063`) +* [CVE-2023-38273](CVE-2023/CVE-2023-382xx/CVE-2023-38273.json) (`2024-02-08T19:35:12.703`) +* [CVE-2023-47148](CVE-2023/CVE-2023-471xx/CVE-2023-47148.json) (`2024-02-08T19:58:30.023`) +* [CVE-2023-47143](CVE-2023/CVE-2023-471xx/CVE-2023-47143.json) (`2024-02-08T20:00:13.007`) +* [CVE-2023-47144](CVE-2023/CVE-2023-471xx/CVE-2023-47144.json) (`2024-02-08T20:01:15.150`) +* [CVE-2023-51939](CVE-2023/CVE-2023-519xx/CVE-2023-51939.json) (`2024-02-08T20:11:36.137`) +* [CVE-2024-24388](CVE-2024/CVE-2024-243xx/CVE-2024-24388.json) (`2024-02-08T20:04:04.027`) +* [CVE-2024-0909](CVE-2024/CVE-2024-09xx/CVE-2024-0909.json) (`2024-02-08T20:07:51.410`) ## Download and Usage