mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-02-08T21:00:24.645079+00:00
This commit is contained in:
parent
d350dba50b
commit
d1194c18a4
@ -2,8 +2,8 @@
|
||||
"id": "CVE-1999-1127",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "1999-12-31T05:00:00.000",
|
||||
"lastModified": "2018-10-12T21:29:22.827",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:35:19.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-772"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:enterprise:*:*:*",
|
||||
"matchCriteriaId": "FA9FD6FB-7D96-42C9-AA8D-654A29FCA465"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:server:*:*:*",
|
||||
"matchCriteriaId": "B48A648C-7D20-4546-B288-FBC795D8FE73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*",
|
||||
"matchCriteriaId": "E30F6C9C-3371-44FF-AD0B-3CAA0AB6F1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:workstation:*:*:*",
|
||||
"matchCriteriaId": "22BA7A30-849D-411B-A790-FC175435379B"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,17 +108,25 @@
|
||||
"url": "http://support.microsoft.com/support/kb/articles/Q195/7/33.asp",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/523.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-017",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-1999-1549",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "1999-11-16T05:00:00.000",
|
||||
"lastModified": "2016-10-18T02:05:53.427",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:46:41.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,13 +80,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_kansas:lynx:2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E01953FC-9DA9-4C14-9989-6A81AA2B42E8"
|
||||
"criteria": "cpe:2.3:a:lynx_project:lynx:2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F143511-3727-4D4A-89A3-226AC46394E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:university_of_kansas:lynx:2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08198583-325B-42B7-8856-14C864838AE7"
|
||||
"criteria": "cpe:2.3:a:lynx_project:lynx:2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D629A2AF-397E-4893-BE86-D396EE88482A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,13 +96,20 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=94286509804526&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/804",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2000-0338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2000-04-23T04:00:00.000",
|
||||
"lastModified": "2008-09-10T19:04:10.273",
|
||||
"lastModified": "2024-02-08T19:23:54.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cvs:cvs:1.10.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9F7CA6E-7D45-46C9-A437-0D0C4D3F25CC"
|
||||
"criteria": "cpe:2.3:a:concurrent_versions_software_project:concurrent_versions_software:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB12A3F8-D509-4EC0-86F0-A832C4D1AE57"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,14 +93,22 @@
|
||||
"url": "http://www.securityfocus.com/bid/1136",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D20000423174038.A520%40clico.pl",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2000-0552",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2000-06-06T04:00:00.000",
|
||||
"lastModified": "2017-10-10T01:29:11.530",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:12:20.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mirabilis:icq:2000.0a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C7B95B0-8CCB-4561-B354-80925B9769D6"
|
||||
"criteria": "cpe:2.3:a:icq:icq:2000a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "419A7941-2E5A-42E8-A3CA-E6020B4A9388"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,6 +93,7 @@
|
||||
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0237.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
@ -80,13 +103,20 @@
|
||||
"url": "http://www.securityfocus.com/bid/1307",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4607",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2000-1198",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-08-31T04:00:00.000",
|
||||
"lastModified": "2016-10-18T02:09:09.803",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:22:50.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,15 +96,26 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=95624629924545&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=95634229925906&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/1132",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2000-1218",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2000-04-14T04:00:00.000",
|
||||
"lastModified": "2019-04-30T14:27:13.473",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:47:22.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,38 +80,18 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40FC681A-7B85-4495-8DCC-C459FE7E2F13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D3B703C-79B2-4FA2-9E12-713AB977A880"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA733AD2-D948-46A0-A063-D29081A56F1F"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2354216-8103-49F9-A95C-7DE4F738BBEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -98,113 +100,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A4FF113-BDCB-472C-A300-3DE5A12A7031"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BDCBCB8-DAA3-465F-ADDE-9143B8251989"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8E32528-4DA7-4FF8-BBA1-929C5C44FAD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B86E0671-ED68-4549-B3AC-FD8BD79B0860"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F9C691E-CD79-4D8B-BD35-04BDE4422A4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB76E7EC-C396-4537-9065-4E815DA7097C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EF2010D-5D16-40A7-B7DE-8168C76E5BDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CD026E2-B073-40A6-AD4A-8C76B9169B01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD500955-71F7-41AD-96EE-E8CC6A7FA7A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBFB3E49-3FB5-4947-856D-727CBFFBA543"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC031C07-FA91-426B-9772-64910AE12635"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9236480-6450-42E1-B1FF-F336488A683A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "D97FA0F5-6A53-4E3A-BFCF-1AFF4B83CB37"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:alpha:*:*:*:*:*",
|
||||
"matchCriteriaId": "C79E6858-BB9C-4229-9DBE-8DA8627D10A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
|
||||
"matchCriteriaId": "403945FA-8676-4D98-B903-48452B46F48F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
|
||||
"matchCriteriaId": "4BF263CB-4239-4DB0-867C-9069ED02CAD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
|
||||
"matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A05337E-18A5-4939-85A0-69583D9B5AD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
|
||||
"matchCriteriaId": "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -216,12 +113,17 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/458659",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4280",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2001-1452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2001-08-31T04:00:00.000",
|
||||
"lastModified": "2023-11-07T01:55:44.167",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:47:25.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,123 +80,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "237D7C18-C8D6-4FDB-A160-FA17DD46A55A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E7E6AD3-5418-4FEA-84B5-833059CA880D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "064F4E76-1B89-4FA5-97ED-64624285C014"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "089A953C-8446-4E6F-B506-430C38DF37B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA262C44-C0E6-493A-B8E5-4D26E4013226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "F66DC6FF-2B3D-4718-838F-9E055E89961F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "656AE014-AEEC-46E8-A696-61FEA7932F21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB519FE0-9E7D-4E71-8873-356C9D7CEAB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA267420-56C5-4697-B0AA-52932F78B24B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "93BA426E-DD51-44AC-BE78-3164670FF9E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "224F8968-9F4C-4727-AAA3-61F5578EF54C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "363E3895-A19B-42EC-B479-765168DC0B17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBBBF25A-709B-4716-9894-AD82180091AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "407DA6E8-0832-49FE-AE14-35C104C237EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "81B7961D-151D-4773-80CB-CCD0456BFEAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "82781A72-A34F-4668-9EE8-C203B04E3367"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFE612D2-DF38-404F-AED1-B8C9C24012DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5CAF64E-98AA-4813-A2A2-5AC3387CF230"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCDFDBBA-6C4F-472A-9F4F-461C424794E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCC5E316-FB61-408B-BAA2-7FE03D581250"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA7BA525-6DB8-4444-934A-932AFED69816"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "90CFA69B-7814-4F97-A14D-D76310065CF3"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -184,7 +96,12 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.kb.cert.org/vuls/id/109475",
|
||||
@ -198,12 +115,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/6791",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3675",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-0051",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-04-04T05:00:00.000",
|
||||
"lastModified": "2019-04-30T14:27:13.710",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:24:03.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,8 +84,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,19 +95,36 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://online.securityfocus.com/archive/1/244329",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/4438",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-016",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A38",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-0788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-08-12T04:00:00.000",
|
||||
"lastModified": "2013-08-03T04:27:27.127",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:13:16.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -81,27 +103,42 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-05/0052.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.1/hotfix/ReadMe.txt",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/9044.php",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/4363",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/4702",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-1484",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-04-22T04:00:00.000",
|
||||
"lastModified": "2008-09-05T20:30:43.313",
|
||||
"lastModified": "2024-02-08T19:56:10.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,13 +84,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:db4web:db4web:3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFA6CADB-FC0D-4853-8474-0D718ECC5F3A"
|
||||
"criteria": "cpe:2.3:a:siemens:db4web:3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E90A22B-1B03-4791-A7E2-119A91DD3E7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:db4web:db4web:3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2191F5E4-EC82-4DFE-8063-667363AEE3FC"
|
||||
"criteria": "cpe:2.3:a:siemens:db4web:3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3363D2BD-F44D-4414-A038-942326DADDE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -80,6 +102,7 @@
|
||||
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0201.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -87,6 +110,7 @@
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0125.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -94,6 +118,7 @@
|
||||
"url": "http://www.iss.net/security_center/static/10136.php",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -102,8 +127,11 @@
|
||||
"url": "http://www.securityfocus.com/bid/5725",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2002-1706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2017-07-11T01:29:21.167",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:47:29.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,78 +81,26 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80AEA6F5-907D-493F-AB07-971D13BC1CAD"
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.3",
|
||||
"versionEndIncluding": "12.2",
|
||||
"matchCriteriaId": "31B3ECA7-7047-4964-B0DD-F1FE3A59AD60"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BB9C1-BA90-452E-A9C8-9B1E15B99650"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ubr7100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7DE45741-2794-43AD-8ECA-3B15E21D91F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A747DB2-A031-470F-8EA5-F37FBE175D18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDEF6AED-4477-4AAC-9759-1996B77DFEE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ubr7200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "543C347E-DBAC-49A0-9BC4-5F89D575DC86"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -141,6 +112,7 @@
|
||||
"url": "http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -149,12 +121,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/5041",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9368",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-1796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:31:32.433",
|
||||
"lastModified": "2024-02-08T20:47:34.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,8 +81,34 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hp:chaivm:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFA8AD68-F38D-4049-8124-5EFAFC5A8C4C"
|
||||
"criteria": "cpe:2.3:a:hp:chaivm_ezloader:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "490B782C-11BF-47E2-8899-8B462D2D8AA6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hp:laserjet_4100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A1779FF-AF54-49D7-B357-3CB62371FA21"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hp:laserjet_4500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FADCF8F9-297F-43B8-A380-D91FDB66BD98"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hp:laserjet_4550:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6EEF0E42-3082-4648-BA3A-3372763F72DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hp:laserjet_8150:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4D75D04-E717-4361-9D62-08DCFF23ED9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,24 +120,45 @@
|
||||
"url": "http://online.securityfocus.com/advisories/4317",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/9695.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.phenoelit.de/stuff/HP_Chai.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/284648",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/5334",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-1914",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:31:50.323",
|
||||
"lastModified": "2024-02-08T19:24:19.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,103 +80,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4A27597-6E76-44FF-9524-F1DF4100458B"
|
||||
"criteria": "cpe:2.3:a:dump_project:dump:0.4:beta10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6D40EBC-1700-4989-8D7F-A09F6DC0375F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92DBC09C-377F-4833-8515-96E631963396"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7787F4F-0DB8-49B5-A915-537378811610"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F65D4820-FFB8-4B20-B32E-2C77E72260E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA31FF8A-895F-48A4-BA90-263800079C44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEC0A662-BD59-4C55-BEF1-E1C6B6816513"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCD730C2-0211-4A1A-A6C5-0ABFA972F0B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "129BC29B-9B54-446B-9FCE-0AAFB078CC50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DF26F4-C017-4063-897A-A4404D6B3E93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE6892AB-82AA-4EC1-B18A-2E223C5B550A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FD9F36C-5234-4570-872B-37C9E5FD5324"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "724B5FC9-C0F0-4536-82DF-396DD6B59C2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C9DFD81-2796-4D8A-B169-B0872EB057BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7990D91-17FC-4F08-A14E-71257D34606E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6EC47A0-E372-49AD-9EE3-584716ACE2A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "858BDD4B-5D02-4084-9F96-9992B2B25569"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "790FF2E9-CB24-46FD-8D06-CD11F74ECF72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E2187AFB-B862-4205-A074-73756DEB3C3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB504379-0AAC-4C12-9586-5F52E58335FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dump:dump:0.4_b29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87B91132-C97C-45AC-9D1D-BD7650A8FA9B"
|
||||
"criteria": "cpe:2.3:a:dump_project:dump:0.4:beta29:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "035AE381-95A6-428F-8240-0A94D2B2D9F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -162,21 +94,51 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://online.securityfocus.com/archive/1/283033",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/21520",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-156.htm",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/9632.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2005-583.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/5264",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-1915",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:31:50.527",
|
||||
"lastModified": "2024-02-08T19:24:08.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -61,26 +83,11 @@
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47E02BE6-4800-4940-B269-385B66AC5077"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EB09993-B837-4352-B09D-3656F62638A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0361EA35-FBD7-4E8F-8625-C8100ED7BB7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29EAA113-2404-4ABB-826B-3AA2AA858D02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
|
||||
@ -96,76 +103,31 @@
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E8A6564-129A-4555-A5ED-6F65C56AE7B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "237174A4-E030-4A0B-AD0B-5C463603EAA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D7F8F11-1869-40E2-8478-28B4E946D3CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9062BAB5-D437-49BE-A384-39F62434B70B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E53C673-9D6D-42C8-A502-033E1FC28D97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
|
||||
@ -312,13 +274,30 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://online.securityfocus.com/archive/1/283033",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/9633.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/5265",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-2066",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:32:14.540",
|
||||
"lastModified": "2024-02-08T20:13:11.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -59,18 +81,14 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetico:bcwipe:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0",
|
||||
"versionEndIncluding": "2.35.1",
|
||||
"matchCriteriaId": "DD1BAE87-106D-498A-B8B7-93EAEBEE995D"
|
||||
"matchCriteriaId": "4D4DCCCB-6358-40FE-BD1A-2AB29934B3A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetico:bcwipe:1.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48992FF9-0E5B-43D7-8F8E-ABBE7F948686"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jetico:bcwipe:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5719D411-9AC0-41C9-AAFD-378F1E8B65FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -82,28 +100,47 @@
|
||||
"url": "http://www.bcwipe.com/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-034.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/7953.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/251565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/3912",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.seifried.org/security/advisories/kssa-003.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-2067",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:32:14.697",
|
||||
"lastModified": "2024-02-08T20:28:24.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,6 +18,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -51,7 +73,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,8 +87,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:east_technologies:east-tec_eraser:2002:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "004858BD-F8BB-4E68-AF21-F0B1151FC762"
|
||||
"criteria": "cpe:2.3:a:east-tec:eraser:2002:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABA5D086-756A-4E98-89C4-26AFA98989CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -78,25 +100,47 @@
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-034.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.east-tec.com/eraser/faq.htm",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/7953.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/251565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/3912",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.seifried.org/security/advisories/kssa-003.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-2068",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:32:14.837",
|
||||
"lastModified": "2024-02-08T20:33:54.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sami_tolvanen:eraser:5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CEEF219-8C61-443B-B0E2-3226FCC60A48"
|
||||
"criteria": "cpe:2.3:a:tolvanen:eraser:5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58FA752B-F21C-4A61-B688-812A8FF4E98C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,21 +93,40 @@
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-034.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/7953.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/251565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/3912",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.seifried.org/security/advisories/kssa-003.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-2069",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:32:14.993",
|
||||
"lastModified": "2024-02-08T20:33:40.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,38 +80,17 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96820199-B27B-40F5-BB3E-F5826060D434"
|
||||
"criteria": "cpe:2.3:a:pgp:personal_privacy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.2",
|
||||
"versionEndIncluding": "6.5.8",
|
||||
"matchCriteriaId": "D3A0768F-FE39-4513-8E92-5C8C3A8262B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:6.5.1i:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FAE1A6C-DB2E-41BE-8497-2F71F79FB9B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:6.5.2a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E4667BD-AED7-4259-BA09-B7D67FB71FF4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:6.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ED585EC-876B-416B-AAD2-9C2CF363F89D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:6.5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C748703-3942-4F2D-BED7-A7CC1EB56D0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A50605E3-3955-44C8-883C-B5D7598FF8C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pgp:pgp:7.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7991F5E4-8302-417A-81B8-BBD5D3B87BB6"
|
||||
"criteria": "cpe:2.3:a:pgp:personal_privacy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0",
|
||||
"versionEndIncluding": "7.1.1",
|
||||
"matchCriteriaId": "8CF5F157-D19E-4C40-9F32-B21B81113230"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -101,21 +102,40 @@
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-034.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/7953.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/251565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/3912",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.seifried.org/security/advisories/kssa-003.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2002-2070",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2002-12-31T05:00:00.000",
|
||||
"lastModified": "2008-09-05T20:32:15.167",
|
||||
"lastModified": "2024-02-08T20:35:32.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:accessdata:secureclean:3_build_2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E99B93F-FFDE-41BA-A70E-4EB7172486AD"
|
||||
"criteria": "cpe:2.3:a:accessdata:secureclean:3:build_2.0:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25F329F5-9CC6-4B30-ABAC-FD54F3E78852"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -71,21 +93,40 @@
|
||||
"url": "http://www.ciac.org/ciac/bulletins/m-034.shtml",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.iss.net/security_center/static/7953.php",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/251565",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/3912",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.seifried.org/security/advisories/kssa-003.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2003-0174",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2003-05-12T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:29:28.337",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:45:57.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,283 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB113626-38E2-4C42-A6A9-4BBDA0AC4A96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "772E3C7E-9947-414F-8642-18653BB048E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D51EC29-8836-4F87-ABF8-FF7530DECBB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "440B7208-34DB-4898-8461-4E703F7EDFB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CEC8518-4DBA-43AA-90B8-279F2DD4A2DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F8286F3-DF0E-4D8E-A27D-0C5182D5870C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5663579C-3AD2-4E5B-A595-C8DB984F9C26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B306EE13-57CF-43A6-AA72-C641C53A2A23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6291BEE1-73D2-4976-B065-E135880F73B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "621C31D9-8102-4F2D-8008-B32020F0B831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FF5E9B8-62F9-4A6F-9C0C-551980981366"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29113D8E-9618-4A0E-9157-678332082858"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F883CF73-CDA0-4B50-98E6-1B5DE0A4A816"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6C9F200-68AC-4B45-8AFC-F604429FDF3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "313613E9-4837-433C-90EE-84A92E8D24E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1742BF2B-63C7-441D-9A01-DE65C95911D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D30B7C42-CEE8-4377-957C-BCCE35C071A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41AA1290-5039-406F-B195-3A4C018202D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B859D7F7-B0A6-4148-8146-F651ED3F99AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59EC5B1A-309A-4DE2-A197-F4DC07A8DC3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60CC9410-F6B8-4748-B76F-30626279028E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E7D3C74-CDD2-4DFF-A331-007E1669752A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03FA10EA-F6E5-4A89-AC37-40FF6A147528"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCC67401-C85A-4E4E-AE61-85FEBBF4346B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C8E0DF6-D9C2-4DBC-9997-B5BFC6DEC9F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1E1480B-2183-45AD-B63F-16DEC9BF0398"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C4427AC-07C1-4765-981B-B5D86D698C2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D08345C-F945-410C-9DCB-8C358178F975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8764BE36-9377-486C-9198-DF79A5A60679"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63EF0CEE-74A9-45C8-8AFD-77815230ACC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25243FA1-7AF7-41D4-8FAD-A5AB289E120D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94D89730-AA61-4FC9-A6AB-0574CA51EE75"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B24D34C-1F95-45C8-9A57-2D2622ED9019"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7B59E7C-B059-41CD-AE33-E9623ADA12BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0DF1B657-C910-4BB0-828C-09B6A59D988D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BD69805-D021-4DCC-9FB6-A0BEA721408A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72D61A9F-AC57-4DD9-9047-74BFA9BFACFC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C254FC5D-895D-4EFC-B9A7-74699D9FE65E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B13C07CC-F615-4F30-B532-4BF6F02F84DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27532639-37CD-4BD2-AE48-F741009D3449"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BE3F77A-909E-4947-A808-BCAB7F96A108"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EED22734-8AAC-4897-BB71-438E19B8A005"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEA9C28F-18E6-4199-9740-FAB00563EBF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4F1E3C7-0FDD-46E1-8748-6A5FF669C95C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6E63313-9533-478D-ACC0-C050FBA3EACF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2334FD6C-444F-4042-AF6D-D654C18C9950"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61370032-AB21-4E93-B143-A92A342AFB1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C833FC19-D913-4C62-B14A-E1B3845D0275"
|
||||
"criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.5.19",
|
||||
"matchCriteriaId": "1B5551AA-3C06-4500-B4A1-BA69CFB296A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -350,25 +98,36 @@
|
||||
"url": "ftp://patches.sgi.com/support/free/security/advisories/20030407-01-P",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ciac.org/ciac/bulletins/n-084.shtml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/7442",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11860",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-1703",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-07-30T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:31:16.433",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:46:04.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -56,11 +78,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fusionphp:fusion_news:3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "940CFBC6-9FCD-4DCF-AD30-C3F65F8CE1C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fusionphp:fusion_news:3.6.1:*:*:*:*:*:*:*",
|
||||
@ -74,13 +91,19 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=109122824523226&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1010829",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -88,13 +111,20 @@
|
||||
"url": "http://www.securityfocus.com/bid/10836",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16853",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-1842",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-12-31T05:00:00.000",
|
||||
"lastModified": "2017-07-11T01:31:23.827",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:46:14.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,29 +11,51 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": true,
|
||||
"userInteractionRequired": false
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": true
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,68 +80,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91CC84AB-0BA6-45BE-9DE8-7243FBF00EB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23264211-2992-4222-9B96-5ABEE1332C5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7F76C32-E24D-4B62-88CE-2D23F457573B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F90A3E1F-0371-45C0-A165-55D94A62C3DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F80A5D98-6C48-461F-8B96-BD32A96CDCA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92F4E55E-4424-4EC8-8013-9A0FFE7D3658"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DA61C83-9CE0-4B5E-A8A1-B9C5C9D74084"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B13CCAA-839F-406D-A7F3-975B4780425A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D375197-0087-479C-991B-964FB83644F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70F6320E-314D-4A8F-BC9A-29F730035C68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EE03D77-9AA8-4DC6-936D-0459BD26B64B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3E16D17-B704-4ADA-8F91-B7D96FB52909"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA80B501-6EC3-4C8E-A83D-F08FC659CF82"
|
||||
"criteria": "cpe:2.3:a:phpnuke:php-nuke:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndIncluding": "7.1",
|
||||
"matchCriteriaId": "275B70ED-0416-40AC-B06F-9FF91FE14BB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -129,18 +93,35 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=108006309112075&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/11195",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/9895",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15596",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-1967",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-04-25T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:31:30.637",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:46:00.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -56,31 +78,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbb:openbb:1.0.0_beta1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E8D8D0-D96F-411D-8611-3381C576AE1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbb:openbb:1.0.0_rc1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CE48C90-79EA-4333-97BF-8ABD0789D625"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbb:openbb:1.0.0_rc2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2F986CB-1C64-4ED2-A3B6-6BA69D2B13CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbb:openbb:1.0.0_rc3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1713141D-40B0-4338-B697-3A077A080438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbb:openbb:1.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F50BB6B-34DD-4AA4-9361-7EF4FFB07122"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbb:openbb:1.0.6:*:*:*:*:*:*:*",
|
||||
@ -94,19 +91,38 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=108301983206107&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1009935",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/11481",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1009935",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15967",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-1995",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-12-31T05:00:00.000",
|
||||
"lastModified": "2017-07-11T01:31:32.137",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:46:08.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:e-zone_media_inc.:fusetalk:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DC24546-0EB6-433B-8CC6-4A2E66D66F53"
|
||||
"criteria": "cpe:2.3:a:fusetalk:fusetalk:2.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57C45CEA-17E7-479D-B9D9-596FB8E9B932"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -69,23 +91,53 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=108377423825478&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/11555",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1010080",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/5895",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/10276",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16080",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2004-2061",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2004-07-27T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:31:35.840",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:56:07.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,48 +80,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81037E77-B30F-4F43-91E8-CBBC48ECD61F"
|
||||
"criteria": "cpe:2.3:a:risearch:risearch:1.0.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9939F0E-CE7C-469E-BC8E-60615728C5E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADD78593-4655-4BC3-879D-E9A6AF2C1388"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A29E933-57AF-4333-84A7-DC579C3B0F91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7EC0CB00-2971-4A18-87D8-1ED9F34F277A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB2EA48B-C4F7-45ED-B0AE-E8C5837F890A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A665A23-215C-4C38-B58E-9BB2CA77D89B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEC603E2-F3C4-4C11-870E-4116C0962142"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch:0.99.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A32597AF-E4C2-47B4-A90E-FBBC80215F81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:risearch_software:risearch_pro:3.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F01B6DBD-10CA-4666-81CB-D2F76C530C14"
|
||||
"criteria": "cpe:2.3:a:risearch:risearch_pro:3.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "01E03BF3-438A-4F5C-B8A5-3DCAB5F9CA8E"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -109,23 +96,60 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=109095196526490&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/12173",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1010788",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/8265",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.osvdb.org/8266",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/10812",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16817",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-0877",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-05-02T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:32:26.953",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:46:18.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,108 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "838E0AFE-841C-4F8E-B474-F05B4F3BF510"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56B390B5-446E-4082-BD3F-C9BD548F66D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3085AD0F-5800-4601-8A39-52602CBFB8EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50065308-7EE7-4B47-AEC8-C4F57D611197"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D79CAF47-A848-4462-AD4B-64C550739270"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2331C05A-E122-4DE4-BA65-0575D6FC1B9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D02A6A6-D36D-4A97-B2B2-8F9BB0B94C89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3BB383B7-708C-4B4E-A6D2-B1835A643246"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "363C67DA-0309-48C2-A49C-4C0C145C6512"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8A35CB9-8D08-4187-8A4D-BAEE71FED60F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC961D2F-40A8-4E75-971B-5312A32B2B9F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1187D5E-7161-40BD-B67D-82176154CD16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53732CE0-FBC3-4571-AB49-69C61C7BE4AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5669B7D1-0C43-42C6-A3C0-3FF9020B29B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9054BC03-902A-4569-89FE-B765181D6AC1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDF92F86-8083-4EF3-A42E-B05173059E67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D53AAC2-6A09-4AFD-A24D-EF4F78E6F173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB01CC8D-650B-4EB4-9B35-E471B7728EBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CD3B486-1D9E-482E-9BFF-BE218ECA806F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5FB2501-8A36-4659-8A44-FDE030D77B7E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dnsmasq:dnsmasq:2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "669F9839-B687-43C1-9744-9E2873944BF3"
|
||||
"criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.21",
|
||||
"matchCriteriaId": "101437BF-EF52-4F04-918F-229CB7CEDC08"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -167,20 +90,39 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/14691",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/12897",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19826",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2005-1306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-06-15T04:00:00.000",
|
||||
"lastModified": "2008-09-05T20:48:47.687",
|
||||
"lastModified": "2024-02-08T19:55:30.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,6 +18,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -51,7 +73,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -93,6 +115,7 @@
|
||||
"url": "http://www.adobe.com/support/techdocs/331710.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -101,8 +124,11 @@
|
||||
"url": "http://www.securityfocus.com/bid/13962",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2005-1674",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-05-19T04:00:00.000",
|
||||
"lastModified": "2008-09-05T20:49:46.403",
|
||||
"lastModified": "2024-02-08T20:47:38.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,8 +80,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubertec:help_center_live:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "361544AA-7E0A-40C7-93A4-5ECF5C3CC6F6"
|
||||
"criteria": "cpe:2.3:a:helpcenterlive:help_center_live:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFC1DC88-215E-4C8E-AA46-20C46E048EB0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,12 +89,22 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00076-05172005",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/398457/2005-05-15/2005-05-21/0",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-1744",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-05-24T04:00:00.000",
|
||||
"lastModified": "2018-10-30T16:26:16.013",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:35:25.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,383 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D9AB3C0-8783-4160-AE2D-D1E5AAAA0A78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "80D90123-74BA-4A70-9A10-6980BAD270B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:*:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "565CBD39-28D6-4A03-BECE-287083CE9FA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDE9282D-C32F-4D2F-81BE-75E447925A23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp1:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "14A085BB-27C9-488F-91F8-19625BF23B94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp1:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1A33785-23D9-4428-B746-71FD404C09E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E6644EF-C875-4005-A628-0AED7B7BB94F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp2:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "8556E775-D130-4658-AFE2-28188224ED54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.0:sp2:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B92BC8B-15AB-4E9A-AC2F-DD6A2F443B36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FDCF6AE-43DC-4AE5-9260-CA657F40BE77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "05AFBE78-C611-4EA2-8B00-5F8B61696CBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC5439C1-D06F-44C6-94F5-2BD8598A506C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DFE26B3-31F2-4FC0-854D-56EA4D08C28A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3B7752C-B297-480A-B3FC-948EA081670C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "E40C38EC-ECA4-4F0C-8468-16191CDB9997"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63017BF8-D681-45EC-9C31-09D029F1126D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "71892EC0-E6B1-4214-AC53-06489F711829"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4FD8871-680E-40F9-85AB-417B5195D4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E0B1791-974A-4967-8CF9-33BE8183200B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "696F52AE-FEB9-4090-872E-FDFD969F5604"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B4BC3F5-BFE8-4834-B427-B6260D5B7A85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B12A8B1-F78E-46B3-8872-4C6484345477"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCED03B6-7565-4F53-8D85-F3391BF66988"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2FE768F-363B-49BC-8410-739B164FB32E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB2FB0E9-3812-49C5-94F4-3B39D5BE2EED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "B70F0353-635F-465B-A7E5-AF2D017AB008"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3DA28D0-18CC-4F99-AABB-EC7863CBD455"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B091903-943F-4822-9F24-9D109B2D76A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE1D6EE4-8545-4D0A-A50B-C8009F054DC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DEDDAF2-555D-4425-B4B6-65B1E9C21FF1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6828CE4B-91E8-4688-977F-DC7BC21131C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBDB9094-78E8-4CBF-9F5F-321D5174F1EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2BB36-AC0B-48E9-91E1-A4465896E87A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E141AA86-C6D0-4FA8-9268-0FB0635DF9CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FB8930F-C6D8-40B9-8D08-751F5B47229B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5C59B80-279B-45B3-9CC1-5A263681025B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "893D9D88-43C4-4F9F-A364-0585DE6FA9E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "D59F9859-7344-43F0-9348-E57FABB9E431"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2D05BAB-AB3B-466E-8301-01A41644DE77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D34E2925-DE2A-437F-B349-BD7103F4C37E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A4EC87D-EF83-48C5-B516-A6A482D9F525"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "935F28E3-9799-4EF6-AB83-62E9C214DD0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16E3F943-D920-4C0A-8545-5CF7D792011F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BBA04D4-BA2E-4495-85DE-38918A878012"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C444DA3-69E3-4465-9173-85966B1162A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "74AE35FF-AC1C-435B-8CE9-F40AFFFA3A46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "25C711BB-E7E0-41D8-985E-5DD386C54637"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "38EFE72C-10E5-4EED-B016-D914FA52DE6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32E8797D-1B62-4480-A79D-0345E65699E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "071FAD20-D502-4634-852A-4CD06FE8E114"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "97E6F518-D320-4655-B698-2D1A82CA3EDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FC1486C-6AC4-44F7-9015-40FD4A341C38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB5909DB-B2E2-4358-9D45-C225C6B02360"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "04C3F96B-A1FF-4E3E-B059-366E176E5E19"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5485722F-5DE4-4CD4-865F-32585537F523"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCB01060-2C29-4F75-8D0A-74F62E9F0A17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CCEDE54-97F3-457A-9886-5BD91C9AED2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "2269D44C-65EA-4ED0-9F03-A32AC5D44EEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E08D4CEA-9ACC-4869-BC87-3524A059914F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3DFE048-905E-4890-809D-F6BCEF7F83C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F5B2A06-CE19-4A57-9566-09FC1E259CDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7560131-A6AC-4BBB-AA2D-C7C63AB51226"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "349036A0-B5E2-4656-8D2D-26BEE9EF9DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D18E22CC-A0FC-4BC7-AD39-2645F57486C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "893C2387-03E3-4F8E-9029-BC64C64239EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "D00633D1-4B38-48D9-B5CD-E8D66EA90599"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9429D939-FCC4-4BA7-90C4-BBEECE7309D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "55661356-58E0-49D3-9C79-B4BB5EBE24CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A1A59C0-31BB-4EE9-90C1-3289C94F690E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0653ACAC-B0D9-4381-AB23-11D24852A414"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*",
|
||||
"matchCriteriaId": "107C2FC6-BC60-4817-8A21-14C81DA6DEF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*",
|
||||
"matchCriteriaId": "209CDA09-CAB2-481D-8DA0-161B670335E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:weblogic_portal:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A220FA9-69A3-4857-A73D-287FDF0E68A1"
|
||||
"criteria": "cpe:2.3:a:bea:weblogic_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "7.0",
|
||||
"matchCriteriaId": "767A0007-20E7-4E77-ACA9-2A812433B509"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -446,20 +94,41 @@
|
||||
"url": "http://dev2dev.bea.com/pub/advisory/127",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/15486",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1014049",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/13717",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2005/0604",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-1947",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-06-09T04:00:00.000",
|
||||
"lastModified": "2016-10-18T03:23:26.700",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:44:52.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,13 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:invision_power_services:invision_gallery:1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CA45453-5C5F-4730-9343-01CAF0F84705"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:invision_power_services:invision_gallery:1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DB69839-3DBF-4C69-94F9-A482A683C641"
|
||||
"criteria": "cpe:2.3:a:invisioncommunity:gallery:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.3.1",
|
||||
"matchCriteriaId": "C0B937E7-778B-4D41-A5CC-B9F25961E600"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,12 +92,16 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=111834146710329&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00079-06092005",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-2059",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-06-29T04:00:00.000",
|
||||
"lastModified": "2016-10-18T03:24:36.117",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:44:57.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -58,103 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65952A65-78AC-4239-9D15-BA850AF64598"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DFF7A22-25CB-4D5E-BA1B-E10E407DA515"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "094040BF-4C59-4266-9683-76C59D332F16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02151FE-89D6-4FB5-82E2-50A2F1046341"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11E1B205-864C-4FAD-8891-12FBAC0E090F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "047CFF77-7616-41A2-9879-EA0E33B4922C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B321E2E-4AD3-4236-918A-F87804990FCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2232ED2E-0323-4DBB-8540-98BD52750025"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "895472F7-D0F8-4C6A-95C6-15963652ABEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "858FAA03-DD05-472D-9F67-3089262F5E82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CAAB6C4-770C-4BC3-9D72-FDA7FD223CF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5D35A71-2F85-4F33-9480-81EE3EB0CEE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E52E29B-9461-4D62-8CCA-6F12DEB63EC6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F82ADBA-67A1-47E8-8D09-21138BDE84AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD0DFCB9-3033-4509-BEDC-2B032524C4CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "124A5853-5C97-412B-B55B-7430B23565DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0ED5EF0-FF8B-4C4B-8157-FBCBF1B34C5D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66D3CCE6-909B-46F4-AD8F-603E433C01D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "803A29EC-E63B-4F66-93E1-60698EE76011"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3159B6DF-CE17-490F-AA01-03E5D2EAC7B4"
|
||||
"criteria": "cpe:2.3:a:ubbcentral:ubb.threads:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.5.1.1",
|
||||
"matchCriteriaId": "B3A4DDC9-01E4-462A-A95F-774B4E31B37C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -164,12 +92,17 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=111963737202040&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00084-06232005",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
@ -179,6 +112,7 @@
|
||||
"url": "http://www.ubbcentral.com/boards/showflat.php/Cat/0/Number/42351/Main/42351/#Post42351",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-2181",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-07-11T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:32:47.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:45:06.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,13 +81,46 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:cisco:7940_router:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "422F7F76-4FC5-4A44-B6DE-B605D15F4EB5"
|
||||
"criteria": "cpe:2.3:o:cisco:ip_phone_7940_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D28EB68E-2F6D-4282-9498-2C2B9B5C8FB1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ip_phone_7940:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F5699B0-45CB-45DA-A52A-FA703DED2558"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:cisco:7960_router:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "538B0209-D534-41F3-BC77-E9D8FBB92B9F"
|
||||
"criteria": "cpe:2.3:o:cisco:ip_phone_7960_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE89E42C-CDC2-4504-9209-959412358487"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ip_phone_7960:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE8A58AD-C791-4803-91FA-7E197612A3C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -74,22 +130,35 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=112067698624686&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://pentest.tele-consulting.com/advisories/05_07_06_voip-phones.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/alerts/2005/Jul/1014406.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21260",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-2182",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-07-11T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:32:47.187",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:45:02.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -44,13 +66,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -58,8 +81,19 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:grandstream:budgetone:100:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "205C4C4B-5F04-4B95-8206-B1E496740804"
|
||||
"criteria": "cpe:2.3:o:grandstream:bt-100_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2409FF3D-5F88-4FB0-A676-1F301EFF434B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:grandstream:bt-100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0006D167-59B4-40FC-BC70-965C910C417C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -69,22 +103,35 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=112067698624686&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://pentest.tele-consulting.com/advisories/05_07_06_voip-phones.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/alerts/2005/Jul/1014407.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21260",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2005-2293",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2005-07-18T04:00:00.000",
|
||||
"lastModified": "2017-07-11T01:32:47.813",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:13:21.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,12 +95,26 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=112129452232307&w=2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/15991/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -87,13 +123,17 @@
|
||||
"url": "http://www.red-database-security.com/advisory/oracle_formsbuilder_temp_file_issue.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21343",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2007-4103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2007-07-31T10:17:00.000",
|
||||
"lastModified": "2018-10-15T21:33:14.243",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:12:32.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "CWE-772"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -62,53 +84,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD80F0D6-6B5B-41D3-AC41-F1643865088A"
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.2.20",
|
||||
"versionEndExcluding": "1.2.23",
|
||||
"matchCriteriaId": "550ACDD4-83E9-470C-A151-51DC311B9C65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "788DEF5E-8A99-463D-89DC-0CC032271554"
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.4.0",
|
||||
"versionEndExcluding": "1.4.9",
|
||||
"matchCriteriaId": "7D5AE015-73F0-450E-AAC4-D60BEE3E71A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62D670E6-47E5-4B40-9217-F97D5F39C3EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6CE7E4E-DA2D-4F03-A226-92965B40AE34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3542DB91-8487-49D6-AA15-E8FD9D6B99D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "661D710E-79F0-4E98-B35B-ED0549D35C24"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.4.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68291ADE-F9D1-427B-B150-FDA7F2F4788B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F80CBCB-F58D-4BE7-8E78-67E04C900D01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisk_appliance_developer_kit:0.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45D880CB-7990-45D2-9AC1-FE840AD92889"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:digium:asterisknow_pre-release:beta6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4BBEBF2-F8AD-447F-B10D-D9D7AFB48D9B"
|
||||
"criteria": "cpe:2.3:a:digium:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.6.0",
|
||||
"matchCriteriaId": "1EB3B452-3577-44C9-AD6C-14982AD5E4A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -118,38 +110,90 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=185713",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://ftp.digium.com/pub/asa/ASA-2007-018.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://osvdb.org/38197",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/26274",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/29051",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200802-11.xml",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/2960",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/475069/100/0/threaded",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/24950",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1018472",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2007/2701",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2008-4636",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2008-11-27T00:30:00.280",
|
||||
"lastModified": "2018-10-30T16:27:33.217",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:34:46.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,7 +48,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -63,58 +63,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:opensuse:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9202A2E-9B01-4B25-A576-4689BC2B8D97"
|
||||
"criteria": "cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5595E484-647C-4F85-94AB-5A4D55CD766B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC4A9CAF-EC05-4822-80C4-86AB74237CA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:9:*:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "39D1A771-23F5-4C2E-A28B-938E462166D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:9.3:*:pro:*:*:*:*:*",
|
||||
"matchCriteriaId": "117E9011-2CFC-4F2D-A0A2-175C0B029641"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:10:*:desktop:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CDD806C-BED4-44E3-B315-C271DC61F824"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:10:*:server:*:*:*:*:*",
|
||||
"matchCriteriaId": "72AB025C-6212-4848-85C2-9325709BA2C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92FB0F1B-80B4-47F9-A54C-51DB7E77CA08"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux:10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DC9268E-4A06-4494-BE50-A3B806AD4937"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63F46359-9B44-4F31-8FB3-EAB498D5DDE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18BE709B-6EEB-489D-B982-6D0D978D1D20"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C93C280-5BC4-4597-B354-7A2B7F196CF0"
|
||||
"criteria": "cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5C0C136-E406-4628-994A-682E8E729B50"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
@ -130,6 +85,36 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA1E7EFF-1CCA-473B-8D5C-30D59C26DC70"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CD2D897-E321-4CED-92E0-11A98B52053C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44320836-E2DE-4A1C-9820-AFFA087FF7FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14DF1463-F23F-465F-8A35-D550A7438CB6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E235E9-EC31-4F3F-80F7-981C720FF353"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02E6A767-B9A5-4054-BE70-286E0A464248"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -140,13 +125,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:yast2-backup:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.14.2",
|
||||
"versionEndIncluding": "2.16.6",
|
||||
"matchCriteriaId": "7035EBC4-6836-4FAB-87F0-BE09B491479F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:yast2-backup:2.14.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2498E88B-D23C-4E54-9A46-96E48C714E6A"
|
||||
"matchCriteriaId": "4668731B-1AF7-48A2-A0BA-9A056E85A559"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -158,19 +139,43 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00003.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://osvdb.org/50284",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/32832",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/32464",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46879",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-3022",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-08-31T20:30:01.047",
|
||||
"lastModified": "2017-08-17T01:31:00.727",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:47:56.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -71,101 +93,6 @@
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:*:-:core:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.2",
|
||||
"matchCriteriaId": "C8D7A923-B0C6-4660-A204-7FB68CBE78A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "619FADEB-7A2D-4928-9B12-DD67F0F721BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3EE1CDD-4E72-4033-A083-AEF17E0BFB3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:-:commercial:*:*:*:*:*",
|
||||
"matchCriteriaId": "51B80A98-14EB-4F8F-BA8C-405A00A373D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:-:core:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2733D8A-1606-4593-8056-1F411116DC64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "147BE856-4EB4-466D-B315-0908C89C5851"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:a:commercial:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC05A9FF-B0FC-46B1-841E-D6416599CE4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.0:a:core:*:*:*:*:*",
|
||||
"matchCriteriaId": "94D40EC9-54F0-4233-836A-725D53EB35D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24AFBCF3-2745-4C97-9F4B-1F14E4974DDD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7635F4B0-1644-485B-9CE8-595013509D4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:-:commercial:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A0EB665-258A-43B1-9C2D-85B70A6BFB38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:-:core:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3ACFFE6-EBE6-4273-84AD-E31429820A1E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE96C6B9-6542-4590-A491-BC652A75FA7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:a:commercial:*:*:*:*:*",
|
||||
"matchCriteriaId": "276023C6-BA5A-402A-9241-2819A11BA33E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:a:core:*:*:*:*:*",
|
||||
"matchCriteriaId": "1660C1EC-FCDD-4486-8F7E-9C7B0A9E833D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC1FC579-1201-436E-9004-B45B761F3ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:b:commercial:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4C1C2A1-4259-42EE-B34E-4D4478CEFEAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.1:b:core:*:*:*:*:*",
|
||||
"matchCriteriaId": "B67F71C4-25D9-46D6-96E8-5B0F26CF43A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0D033C8-41ED-4FD1-88F1-0D031BE627EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itd-inc:bingo\\!cms:1.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D498BEE6-824C-4C5A-8D00-1E7E8DC139B5"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -175,22 +102,49 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN68640473/index.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000058.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://osvdb.org/57425",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36458",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.bingo-cms.jp/security/jvn68640473.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52838",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2009-3520",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-10-01T15:30:00.420",
|
||||
"lastModified": "2009-10-01T15:30:00.420",
|
||||
"lastModified": "2024-02-08T20:48:01.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -62,8 +84,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jean-michel_wyttenbach:cmsphp:0.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "259A491F-5F57-4E64-A95C-52AEC56451C6"
|
||||
"criteria": "cpe:2.3:a:cmsphp_project:cmsphp:0.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E180220B-E6A7-4D9A-8B60-62176850E077"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -75,8 +97,17 @@
|
||||
"url": "http://packetstormsecurity.org/0909-exploits/cmsphp-xsrf.txt",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/36075",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2009-3759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2009-10-22T17:30:00.517",
|
||||
"lastModified": "2017-09-19T01:29:45.937",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:48:04.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -62,8 +84,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:citrix:xencenterweb:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA67DCE8-9246-467B-872C-FF9518EF94CA"
|
||||
"criteria": "cpe:2.3:a:citrix:xencenterweb:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "017F01DD-E95A-4073-9AA1-69A55786ABA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,40 +95,64 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txt",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1022520",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.exploit-db.com/exploits/9106",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/504764",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/35592",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2009/1814",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51576",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2010-1637",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2010-06-22T17:30:01.103",
|
||||
"lastModified": "2012-02-14T03:55:38.273",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:56:01.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,6 +15,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -48,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -65,451 +87,78 @@
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.4.20",
|
||||
"matchCriteriaId": "4C85CDDA-ED8F-4878-807D-D725E83354F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C2F0267-47D5-436F-B9F6-505CEC582AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "565E131D-56A9-46AB-800D-12B097FE3B7B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FAB6F43-2DAE-4E02-8F0A-EE4D4FB3E005"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86DB6243-3A4A-419E-B6C5-D61F5B0A1E7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2805F37-B8E6-4647-9E90-50763C7E4952"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "284E543F-6AC3-45CD-8448-3A1D4D3DD469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C7E957E-81C0-4FA3-9944-5E514874BED8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FF0DACB-F875-448B-86DF-D40531A2A762"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "651432C3-1EE9-4BBA-A1CF-DCC9F19954D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E11C84D0-13B5-4298-B9F3-BF5C6F927793"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEE72FA1-E635-436B-A650-A8D4040925B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "512F2AB5-EB24-4846-B924-377D040C131A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25F42A76-BF06-4DA9-8667-0E81D17B5B9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02410BAB-C1D7-4883-A27B-C13A72707CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8509AAEE-225C-4907-884D-F9796ACA40F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD41781D-1F7E-43A7-AD59-ADFE1D04D825"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78650B7E-9638-46FF-9656-38E8DFE3FA93"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94CBBB8E-E0AB-4F7B-A55E-F7BD5F83EAAB"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C1E1172-9D9E-439E-BD4B-4EF372344F59"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E44669D7-6C1E-4844-B78A-73E253A7CC17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF"
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2D59BD0-43DE-4E58-A057-640AB98359A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5EBF40C5-6272-427C-97A1-3CE3B1D47B12"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB15C5DD-2D76-47ED-883C-D1901B96F391"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3E249ED-76DA-44B3-A3A7-788F4B1A19DD"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.6.8",
|
||||
"matchCriteriaId": "5472AEFC-EA25-49B1-AA2B-8405099B4FBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABD0A21F-CD80-4B01-B5D3-9B2281E4F143"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.6.8",
|
||||
"matchCriteriaId": "BD16A092-B263-400F-BD7E-94DEB5D57EDB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA516843-2A45-4705-9669-4B719F722192"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DA068C0-8067-4A94-9F74-0D1DACF9A9EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49F37AD5-120E-4FEA-ADA5-F6C3434B9BA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C059835E-8FD9-40DF-BA6F-7E313E49F511"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E28A825-56F4-4EC5-9D62-661C0F4B477F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "545CD944-7C64-49E3-A32E-3388B5F3ECF1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A55A98B3-34ED-4A90-BB78-50CB56B1B51F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F7F3531-E0EE-48AA-BCB4-872BEB853531"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC5143ED-D4C5-4830-9C96-0B54D03679CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B765AEC-09E9-456C-8B57-09927E55D119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AAFC3B0-DCE3-4190-B279-E095C666FA34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9291A565-0BD6-4B5E-B45F-9DE65AB8159D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6F53A84-FC66-4963-A728-7285F63D4761"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69A941FF-423E-49C5-AE1F-FE7ED016CA3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75E2349D-4B4C-469C-82CE-09C4B526BCFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B34FDB1D-881B-4343-A76E-F23B93A0469A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "052914F8-B52C-4AB4-8F85-68D788B588C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "617C554F-8E7D-4F8A-AF63-C193934C8215"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15F11950-A2E4-4F57-BF87-57788B841A21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F886B99-E996-4BF7-9BE3-14A6713A997F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65801122-2E5D-4244-9D37-5483F5C731F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A29559D-0DB8-40C8-A6E6-4F37DDD27571"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "026730B8-3919-4100-8607-C640ADBDD662"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4D1297B-EE36-46E2-8722-34F385A54751"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2C179A3C-8C8C-429B-BACA-8ADAE4170465"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C3A6CFE-CFA4-4B48-9738-063A2B1025FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc2a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2664D22F-B0E6-48AB-BBBA-C653C1AF77A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0-r1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F6B4BA8-1379-44CF-B87D-9DA66B5F2484"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4AD31177-05BB-4623-AED7-765DB7E44E47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20247A22-9AB9-4BCE-BF28-350B52FBC62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB0ABD26-2EA3-4884-BA0B-FFB88177CFDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCC479F3-6F3B-46CB-9D28-2DB7D76FDAE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EDC2C56-E977-452F-9263-541091356B67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B743DEC2-1ED2-4CAC-87F4-4EFDF16159FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5CCE37B1-932D-4A4A-B4CA-056E26D78659"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79E6734C-EE1C-40B6-9759-15298707A6F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:r3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F66D66B1-992E-4EE0-A189-0974B96FE721"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70484027-647C-47DF-85FD-3323F4685613"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD4071B2-3D4F-4755-98B1-E28CEB05EA8B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4AAFE2B-77AB-4AC3-A22C-C3C256E2E45A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF6591E5-5F36-4663-85A6-9D870FD49FC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03D847B0-DE1D-49D7-9ED4-30C0A82209AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D062B70A-E5FF-403B-8BD1-777D6462B7CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D4CFD4D-EAC3-4325-A87F-9D5F4C513208"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A53D0058-6216-4136-8F0A-A6B4AD475DA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A884536-4D27-4350-B815-AB4E625879DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4429B95B-273A-45F3-A066-9AF548AC3FC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD89F143-EEBF-472D-9653-E7534F5799FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "796C453E-D59A-4988-BD91-24F31646D8FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8.4fc6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A901766-B49B-4983-98AB-880B333C284B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9851AD9-5093-4482-A632-487C6D104C9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BA5BA42-F53A-4E0D-B04C-D70D2291E408"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18AF3BC6-E33B-44BD-A2F6-A7F5244AA4FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "77776503-3258-400D-8404-233EAFA940AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "682BC5E2-F2C5-4B6F-8EF0-E05152BB9B12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABC24558-B7C1-4DE7-BC24-AF092DF0DE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "537E4C91-91F9-469B-BF7D-5B05624D637A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0986D113-C9F9-4645-8968-D165EC6B917D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3893B3D9-BAA3-4FCD-BC58-C4B664E688B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8608AE1-7930-47CF-B2E8-9E86E2FB5A20"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34EB1B08-4377-4496-A278-19616238900F"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BF9DF8F-368B-44A0-9258-49298E41E0E2"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14735797-F6A9-42C8-9E05-9A427AD69EFD"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0C44025-C79D-4791-8EF6-3E26786E194E"
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -517,25 +166,54 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/40307",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://squirrelmail.org/security/issue/2010-06-21",
|
||||
@ -547,7 +225,10 @@
|
||||
},
|
||||
{
|
||||
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951",
|
||||
@ -558,46 +239,78 @@
|
||||
},
|
||||
{
|
||||
"url": "http://support.apple.com/kb/HT5130",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:120",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/05/25/3",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/05/25/9",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2010/06/21/1",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/40291",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/40307",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1535",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1536",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2010/1554",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-8315",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-01-23T21:59:00.423",
|
||||
"lastModified": "2023-11-07T02:28:23.407",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T20:34:07.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -106,6 +106,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/96389",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -114,6 +115,7 @@
|
||||
"url": "https://nodesecurity.io/advisories/46",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
@ -121,7 +123,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,9 +2,9 @@
|
||||
"id": "CVE-2016-4029",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2016-08-07T16:59:00.143",
|
||||
"lastModified": "2017-11-04T01:29:19.617",
|
||||
"vulnStatus": "Modified",
|
||||
"evaluatorComment": "<a href=\"https://cwe.mitre.org/data/definitions/918.html\">CWE-918: Server-Side Request Forgery (SSRF)</a>",
|
||||
"lastModified": "2024-02-08T19:56:14.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"evaluatorComment": "CWE-918: Server-Side Request Forgery (SSRF)",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -71,7 +71,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -86,8 +86,23 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.4.4",
|
||||
"matchCriteriaId": "8EAA1EC6-E3AC-48C9-85FE-F43535053480"
|
||||
"versionEndExcluding": "4.5",
|
||||
"matchCriteriaId": "47CE68DF-6C7B-4CD4-BFA7-DE2D97EC961F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,22 +119,33 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.debian.org/security/2016/dsa-3681",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1036594",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://core.trac.wordpress.org/query?status=closed&milestone=4.5",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpvulndb.com/vulnerabilities/8473",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-11930",
|
||||
"sourceIdentifier": "cve-assign@fb.com",
|
||||
"published": "2019-12-04T17:16:43.087",
|
||||
"lastModified": "2020-10-06T18:23:58.057",
|
||||
"lastModified": "2024-02-08T20:12:24.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -152,8 +152,7 @@
|
||||
"url": "https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36",
|
||||
"source": "cve-assign@fb.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -167,7 +166,7 @@
|
||||
"url": "https://www.facebook.com/security/advisories/cve-2019-11930",
|
||||
"source": "cve-assign@fb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-12041",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-13T13:29:02.243",
|
||||
"lastModified": "2019-05-13T18:42:09.117",
|
||||
"lastModified": "2024-02-08T20:28:10.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -84,8 +84,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA15E926-6695-47EF-9683-D55988A8C0FD"
|
||||
"criteria": "cpe:2.3:a:remarkable_project:remarkable:1.7.1:*:*:*:*:node.js:*:*",
|
||||
"matchCriteriaId": "EBD1C278-8330-40CA-B276-F646A2419E00"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -98,6 +98,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-16215",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-09-18T12:15:10.910",
|
||||
"lastModified": "2019-09-18T18:27:18.170",
|
||||
"lastModified": "2024-02-08T20:28:52.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-21469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.257",
|
||||
"lastModified": "2023-11-07T03:19:43.853",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:25:02.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,19 +17,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
@ -75,11 +75,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.postgresql.org/message-id/flat/CAA8ZSMqAHDCgo07hqKoM5XJaoQy6Vv76O7966agez4ffyQktkA%40mail.gmail.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.postgresql.org/support/security/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-5243",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2020-02-21T00:15:10.960",
|
||||
"lastModified": "2020-02-25T19:44:54.697",
|
||||
"lastModified": "2024-02-08T20:12:57.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -114,9 +114,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:uap-core_project:uap-core:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:uap-core_project:uap-core:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "0.7.3",
|
||||
"matchCriteriaId": "E93CB3F6-D527-456D-ADDB-C3D911A1815D"
|
||||
"matchCriteriaId": "01D32B5D-738D-4349-B7E5-18C9F1B66947"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -128,8 +128,7 @@
|
||||
"url": "https://github.com/ua-parser/uap-core/commit/0afd61ed85396a3b5316f18bfd1edfaadf8e88e1",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-21317",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-02-16T18:15:12.583",
|
||||
"lastModified": "2021-02-26T14:26:49.740",
|
||||
"lastModified": "2024-02-08T20:29:02.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,8 +85,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,8 +128,7 @@
|
||||
"url": "https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-41232",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2021-11-02T18:15:08.710",
|
||||
"lastModified": "2021-11-04T20:59:07.707",
|
||||
"lastModified": "2024-02-08T20:35:02.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
@ -132,8 +136,7 @@
|
||||
"url": "https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-27223",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-03-16T00:15:09.993",
|
||||
"lastModified": "2023-01-19T03:24:11.227",
|
||||
"lastModified": "2024-02-08T20:50:26.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -77,7 +77,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -86,15 +85,57 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.18",
|
||||
"versionEndExcluding": "4.9.304",
|
||||
"matchCriteriaId": "D258D5FB-D90C-404C-A81D-71B02C571C58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.269",
|
||||
"matchCriteriaId": "F0F577D3-EFEA-42CF-80AA-905297529D7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.232",
|
||||
"matchCriteriaId": "EF11C6DC-8B9A-4A37-B1E6-33B68F5366ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.182",
|
||||
"matchCriteriaId": "EE74CED8-43BF-4060-9578-93A09735B4E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.103",
|
||||
"matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.26",
|
||||
"matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.12",
|
||||
"matchCriteriaId": "FD5AEF0D-5C5B-4ABC-BC82-E0A5C7822EC0"
|
||||
"matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -299,7 +340,6 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-42745",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2022-11-03T20:15:32.387",
|
||||
"lastModified": "2022-11-05T00:32:34.860",
|
||||
"lastModified": "2024-02-08T19:55:44.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "CandidATS versi\u00f3n 3.0.0 permite a un atacante externo leer archivos arbitrarios del servidor. Esto es posible porque la aplicaci\u00f3n es vulnerable a XXE."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -41,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-776"
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -55,8 +59,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:auieo:candidats:3.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49FA43A5-7FB5-4E3A-8530-06C2BC31B078"
|
||||
"criteria": "cpe:2.3:a:auieosoftware:candidats:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "293D06E8-8EC0-478D-8279-7BEB2628D165"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20180",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-07-07T20:15:09.943",
|
||||
"lastModified": "2024-01-25T17:15:32.870",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:07:44.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20221",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-08-16T22:15:11.687",
|
||||
"lastModified": "2024-01-25T17:15:38.170",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:07:51.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37621",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-01T09:15:56.177",
|
||||
"lastModified": "2024-02-08T18:45:52.103",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-02-08T19:04:55.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-38273",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T15:15:09.270",
|
||||
"lastModified": "2024-02-02T16:30:16.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T19:35:12.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Cloud Pak System 2.3.1.1, 2.3.2.0, and 2.3.3.7 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 260733."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Cloud Pak System 2.3.1.1, 2.3.2.0 y 2.3.3.7 utiliza una configuraci\u00f3n de bloqueo de cuenta inadecuada que podr\u00eda permitir a un atacante remoto utilizar fuerza bruta en las credenciales de la cuenta. ID de IBM X-Force: 260733."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +70,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260733",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cloud_pak_system:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.3.3.0",
|
||||
"versionEndIncluding": "2.3.3.6",
|
||||
"matchCriteriaId": "A28FDA5D-1220-4585-97AF-A9349CFB3971"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105357",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cloud_pak_system:2.3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7D9DA5D-895C-45D9-909C-9C04454A1BB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cloud_pak_system:2.3.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5153F3A-2257-42A5-AA87-4387D374C7BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A41D520-7446-441A-B488-5B98CF7CA8D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260733",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105357",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40547",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-25T16:15:07.717",
|
||||
"lastModified": "2024-02-08T17:15:10.703",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-08T19:25:40.323",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
@ -63,6 +63,10 @@
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-47142",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T14:15:54.013",
|
||||
"lastModified": "2024-02-02T16:30:16.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T19:32:57.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.10 could allow an attacker on the organization's local network to escalate their privileges due to unauthorized API access. IBM X-Force ID: 270267."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 a 7.3.0.10 podr\u00eda permitir que un atacante en la red local de la organizaci\u00f3n escale sus privilegios debido a un acceso API no autorizado. ID de IBM X-Force: 270267."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +70,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270267",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3.0.0",
|
||||
"versionEndIncluding": "7.3.0.10",
|
||||
"matchCriteriaId": "3E196A63-7C6F-40A1-B04D-CB074A57BF67"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270267",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47143",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T13:15:08.253",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T20:00:13.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -39,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +80,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270270",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3.0.0",
|
||||
"versionEndExcluding": "7.3.0.11",
|
||||
"matchCriteriaId": "17C50B97-4260-4C1E-9B20-0E312D22EEA4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270270",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47144",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T13:15:08.480",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T20:01:15.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +70,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270271",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3.0.0",
|
||||
"versionEndExcluding": "7.3.0.11",
|
||||
"matchCriteriaId": "17C50B97-4260-4C1E-9B20-0E312D22EEA4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270271",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7105139",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47148",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-02-02T13:15:08.687",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T19:58:30.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +70,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270599",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.1.0",
|
||||
"versionEndExcluding": "10.1.15.3",
|
||||
"matchCriteriaId": "D7B7F435-1A3E-445F-86E3-18D16B343C32"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7096482",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270599",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7096482",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,96 @@
|
||||
"id": "CVE-2023-51939",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-01T07:15:08.450",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T20:11:36.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the cp_bbs_sig function in relic/src/cp/relic_cp_bbs.c of Relic relic-toolkit 0.6.0 allows a remote attacker to obtain sensitive information and escalate privileges via the cp_bbs_sig function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en la funci\u00f3n cp_bbs_sig en relic/src/cp/relic_cp_bbs.c de Relic relic-toolkit 0.6.0 permite a un atacante remoto obtener informaci\u00f3n confidencial y escalar privilegios a trav\u00e9s de la funci\u00f3n cp_bbs_sig."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://gist.github.com/liang-junkai/1b59487c0f7002fa5da98035b53e409f",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/liang-junkai/Relic-bbs-fault-injection",
|
||||
"source": "cve@mitre.org"
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://github.com/relic-toolkit/relic/issues/284",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:relic_project:relic:0.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E51401A1-E232-4848-8A65-FF9057152978"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/liang-junkai/1b59487c0f7002fa5da98035b53e409f",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/liang-junkai/Relic-bbs-fault-injection",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/relic-toolkit/relic/issues/284",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-02xx/CVE-2024-0242.json
Normal file
59
CVE-2024/CVE-2024-02xx/CVE-2024-0242.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-0242",
|
||||
"sourceIdentifier": "productsecurity@jci.com",
|
||||
"published": "2024-02-08T20:15:52.407",
|
||||
"lastModified": "2024-02-08T20:15:52.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain circumstances IQ Panel4 and IQ4 Hub panel software prior to version 4.4.2 could allow unauthorized access to settings."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "productsecurity@jci.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "productsecurity@jci.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-039-01",
|
||||
"source": "productsecurity@jci.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories",
|
||||
"source": "productsecurity@jci.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2024-0909",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-03T06:15:48.057",
|
||||
"lastModified": "2024-02-05T02:09:43.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T20:07:51.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Anonymous Restricted Content plugin for WordPress is vulnerable to information disclosure in all versions up to, and including, 1.6.2. This is due to insufficient restrictions through the REST API on the posts/pages that protections are being place on. This makes it possible for unauthenticated attackers to access protected content."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento de Anonymous Restricted Content para WordPress es vulnerable a la divulgaci\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.6.2 incluida. Esto se debe a restricciones insuficientes a trav\u00e9s de la API REST en las publicaciones/p\u00e1ginas en las que se aplican protecciones. Esto hace posible que atacantes no autenticados accedan a contenido protegido."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +58,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030199%40anonymous-restricted-content&new=3030199%40anonymous-restricted-content&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030608%40anonymous-restricted-content&new=3030608%40anonymous-restricted-content&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f478ff7c-7193-4c59-a84f-c7cafff9b6c0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tarassych:anonymous_restricted_content:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.6.2",
|
||||
"matchCriteriaId": "A3C44DCE-78DA-4218-B10B-F427495F9727"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030199%40anonymous-restricted-content&new=3030199%40anonymous-restricted-content&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3030608%40anonymous-restricted-content&new=3030608%40anonymous-restricted-content&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f478ff7c-7193-4c59-a84f-c7cafff9b6c0?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-13xx/CVE-2024-1329.json
Normal file
55
CVE-2024/CVE-2024-13xx/CVE-2024-1329.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-1329",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2024-02-08T20:15:52.643",
|
||||
"lastModified": "2024-02-08T20:15:52.643",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HashiCorp Nomad and Nomad Enterprise 1.5.13 up to 1.6.6, and 1.7.3 template renderer is vulnerable to arbitrary file write on the host as the Nomad client user through symlink attacks. Fixed in Nomad 1.7.4, 1.6.7, 1.5.14."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-610"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack",
|
||||
"source": "security@hashicorp.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-227xx/CVE-2024-22795.json
Normal file
28
CVE-2024/CVE-2024-227xx/CVE-2024-22795.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-22795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T19:15:08.110",
|
||||
"lastModified": "2024-02-08T19:15:08.110",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 allows a local attacker to escalate privileges via the Recheck Compliance Status component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Hagrid29/aea0dc35a1e87813dbbb7b317853d023",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Hagrid29/ForeScout-SecureConnector-EoP",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.forescout.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-228xx/CVE-2024-22836.json
Normal file
28
CVE-2024/CVE-2024-228xx/CVE-2024-22836.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-22836",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T20:15:52.830",
|
||||
"lastModified": "2024-02-08T20:15:52.830",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability exists in Akaunting v3.1.3 and earlier. An attacker can manipulate the company locale when installing an app to execute system commands on the hosting server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://akaunting.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/akaunting/akaunting/releases/tag/3.1.4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/u32i/cve/tree/main/CVE-2024-22836",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-236xx/CVE-2024-23660.json
Normal file
24
CVE-2024/CVE-2024-236xx/CVE-2024-23660.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-23660",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T20:15:52.887",
|
||||
"lastModified": "2024-02-08T20:15:52.887",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Binance Trust Wallet app for iOS in commit 3cd6e8f647fbba8b5d8844fcd144365a086b629f, git tag 0.0.4 misuses the trezor-crypto library and consequently generates mnemonic words for which the device time is the only entropy source, leading to economic losses, as exploited in the wild in July 2023. An attacker can systematically generate mnemonics for each timestamp within an applicable timeframe, and link them to specific wallet addresses in order to steal funds from those wallets."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://milksad.info/posts/research-update-5/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-237xx/CVE-2024-23764.json
Normal file
24
CVE-2024/CVE-2024-237xx/CVE-2024-23764.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-23764",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T19:15:08.180",
|
||||
"lastModified": "2024-02-08T19:15:08.180",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain WithSecure products allow Local Privilege Escalation. This affects WithSecure Client Security 15 and later, WithSecure Server Security 15 and later, WithSecure Email and Server Security 15 and later, and WithSecure Elements Endpoint Protection 17 and later."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.withsecure.com/en/support/security-advisories",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.withsecure.com/en/support/security-advisories/cve-2024-23764",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-241xx/CVE-2024-24115.json
Normal file
20
CVE-2024/CVE-2024-241xx/CVE-2024-24115.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-24115",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T20:15:52.933",
|
||||
"lastModified": "2024-02-08T20:15:52.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the Edit Page function of Cotonti CMS v0.9.24 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mechaneus.github.io/CVE-PENDING-COTONTI.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-242xx/CVE-2024-24215.json
Normal file
28
CVE-2024/CVE-2024-242xx/CVE-2024-24215.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-24215",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-08T19:15:08.233",
|
||||
"lastModified": "2024-02-08T19:15:08.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component /cgi-bin/GetJsonValue.cgi of Cellinx NVT Web Server 5.0.0.014 allows attackers to leak configuration information via a crafted POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24215",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://reference3.example.com//1.222.228.4/%2C",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://reference4.example.com",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-24388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T10:15:08.870",
|
||||
"lastModified": "2024-02-02T13:36:23.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-08T20:04:04.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,11 +14,68 @@
|
||||
"value": "Vulnerabilidad de Cross-site scripting (XSS) en las versiones de XunRuiCMS v4.6.2 y anteriores, permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de solicitudes maliciosas manipuladas para el inicio de sesi\u00f3n en segundo plano."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://www.cnblogs.com/rxtycc/p/17948379",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.6.2",
|
||||
"matchCriteriaId": "841354CA-9629-4EB7-946B-7A32F135336B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cnblogs.com/rxtycc/p/17948379",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-08T19:00:32.755802+00:00
|
||||
2024-02-08T21:00:24.645079+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-08T18:53:14.107000+00:00
|
||||
2024-02-08T20:50:26.827000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,49 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
237958
|
||||
237966
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
* [CVE-2023-42282](CVE-2023/CVE-2023-422xx/CVE-2023-42282.json) (`2024-02-08T17:15:10.840`)
|
||||
* [CVE-2023-50061](CVE-2023/CVE-2023-500xx/CVE-2023-50061.json) (`2024-02-08T18:15:08.157`)
|
||||
* [CVE-2024-25189](CVE-2024/CVE-2024-251xx/CVE-2024-25189.json) (`2024-02-08T17:15:10.960`)
|
||||
* [CVE-2024-25190](CVE-2024/CVE-2024-251xx/CVE-2024-25190.json) (`2024-02-08T17:15:11.013`)
|
||||
* [CVE-2024-25191](CVE-2024/CVE-2024-251xx/CVE-2024-25191.json) (`2024-02-08T17:15:11.067`)
|
||||
* [CVE-2024-24213](CVE-2024/CVE-2024-242xx/CVE-2024-24213.json) (`2024-02-08T18:15:08.237`)
|
||||
* [CVE-2024-24321](CVE-2024/CVE-2024-243xx/CVE-2024-24321.json) (`2024-02-08T18:15:08.293`)
|
||||
* [CVE-2024-22795](CVE-2024/CVE-2024-227xx/CVE-2024-22795.json) (`2024-02-08T19:15:08.110`)
|
||||
* [CVE-2024-23764](CVE-2024/CVE-2024-237xx/CVE-2024-23764.json) (`2024-02-08T19:15:08.180`)
|
||||
* [CVE-2024-24215](CVE-2024/CVE-2024-242xx/CVE-2024-24215.json) (`2024-02-08T19:15:08.233`)
|
||||
* [CVE-2024-0242](CVE-2024/CVE-2024-02xx/CVE-2024-0242.json) (`2024-02-08T20:15:52.407`)
|
||||
* [CVE-2024-1329](CVE-2024/CVE-2024-13xx/CVE-2024-1329.json) (`2024-02-08T20:15:52.643`)
|
||||
* [CVE-2024-22836](CVE-2024/CVE-2024-228xx/CVE-2024-22836.json) (`2024-02-08T20:15:52.830`)
|
||||
* [CVE-2024-23660](CVE-2024/CVE-2024-236xx/CVE-2024-23660.json) (`2024-02-08T20:15:52.887`)
|
||||
* [CVE-2024-24115](CVE-2024/CVE-2024-241xx/CVE-2024-24115.json) (`2024-02-08T20:15:52.933`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `23`
|
||||
Recently modified CVEs: `63`
|
||||
|
||||
* [CVE-2002-0639](CVE-2002/CVE-2002-06xx/CVE-2002-0639.json) (`2024-02-08T18:37:46.120`)
|
||||
* [CVE-2002-0391](CVE-2002/CVE-2002-03xx/CVE-2002-0391.json) (`2024-02-08T18:38:00.947`)
|
||||
* [CVE-2004-2013](CVE-2004/CVE-2004-20xx/CVE-2004-2013.json) (`2024-02-08T17:59:17.197`)
|
||||
* [CVE-2005-1141](CVE-2005/CVE-2005-11xx/CVE-2005-1141.json) (`2024-02-08T18:37:12.213`)
|
||||
* [CVE-2005-1513](CVE-2005/CVE-2005-15xx/CVE-2005-1513.json) (`2024-02-08T18:38:11.297`)
|
||||
* [CVE-2005-0102](CVE-2005/CVE-2005-01xx/CVE-2005-0102.json) (`2024-02-08T18:39:13.740`)
|
||||
* [CVE-2010-1866](CVE-2010/CVE-2010-18xx/CVE-2010-1866.json) (`2024-02-08T18:38:19.200`)
|
||||
* [CVE-2020-15708](CVE-2020/CVE-2020-157xx/CVE-2020-15708.json) (`2024-02-08T17:33:49.730`)
|
||||
* [CVE-2022-35868](CVE-2022/CVE-2022-358xx/CVE-2022-35868.json) (`2024-02-08T18:40:59.770`)
|
||||
* [CVE-2023-44312](CVE-2023/CVE-2023-443xx/CVE-2023-44312.json) (`2024-02-08T17:08:11.110`)
|
||||
* [CVE-2023-44313](CVE-2023/CVE-2023-443xx/CVE-2023-44313.json) (`2024-02-08T17:13:28.083`)
|
||||
* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-02-08T17:15:10.703`)
|
||||
* [CVE-2023-5390](CVE-2023/CVE-2023-53xx/CVE-2023-5390.json) (`2024-02-08T17:18:46.787`)
|
||||
* [CVE-2023-6258](CVE-2023/CVE-2023-62xx/CVE-2023-6258.json) (`2024-02-08T17:29:26.097`)
|
||||
* [CVE-2023-50357](CVE-2023/CVE-2023-503xx/CVE-2023-50357.json) (`2024-02-08T17:40:13.563`)
|
||||
* [CVE-2023-47020](CVE-2023/CVE-2023-470xx/CVE-2023-47020.json) (`2024-02-08T18:42:36.577`)
|
||||
* [CVE-2023-37621](CVE-2023/CVE-2023-376xx/CVE-2023-37621.json) (`2024-02-08T18:45:52.103`)
|
||||
* [CVE-2024-22200](CVE-2024/CVE-2024-222xx/CVE-2024-22200.json) (`2024-02-08T17:01:25.927`)
|
||||
* [CVE-2024-21653](CVE-2024/CVE-2024-216xx/CVE-2024-21653.json) (`2024-02-08T17:33:27.273`)
|
||||
* [CVE-2024-22287](CVE-2024/CVE-2024-222xx/CVE-2024-22287.json) (`2024-02-08T17:38:14.320`)
|
||||
* [CVE-2024-23838](CVE-2024/CVE-2024-238xx/CVE-2024-23838.json) (`2024-02-08T18:02:03.540`)
|
||||
* [CVE-2024-24834](CVE-2024/CVE-2024-248xx/CVE-2024-24834.json) (`2024-02-08T18:42:36.577`)
|
||||
* [CVE-2024-24548](CVE-2024/CVE-2024-245xx/CVE-2024-24548.json) (`2024-02-08T18:53:14.107`)
|
||||
* [CVE-2009-3759](CVE-2009/CVE-2009-37xx/CVE-2009-3759.json) (`2024-02-08T20:48:04.980`)
|
||||
* [CVE-2010-1637](CVE-2010/CVE-2010-16xx/CVE-2010-1637.json) (`2024-02-08T19:56:01.377`)
|
||||
* [CVE-2015-8315](CVE-2015/CVE-2015-83xx/CVE-2015-8315.json) (`2024-02-08T20:34:07.077`)
|
||||
* [CVE-2016-4029](CVE-2016/CVE-2016-40xx/CVE-2016-4029.json) (`2024-02-08T19:56:14.470`)
|
||||
* [CVE-2019-11930](CVE-2019/CVE-2019-119xx/CVE-2019-11930.json) (`2024-02-08T20:12:24.120`)
|
||||
* [CVE-2019-12041](CVE-2019/CVE-2019-120xx/CVE-2019-12041.json) (`2024-02-08T20:28:10.007`)
|
||||
* [CVE-2019-16215](CVE-2019/CVE-2019-162xx/CVE-2019-16215.json) (`2024-02-08T20:28:52.407`)
|
||||
* [CVE-2020-21469](CVE-2020/CVE-2020-214xx/CVE-2020-21469.json) (`2024-02-08T19:25:02.497`)
|
||||
* [CVE-2020-5243](CVE-2020/CVE-2020-52xx/CVE-2020-5243.json) (`2024-02-08T20:12:57.650`)
|
||||
* [CVE-2021-21317](CVE-2021/CVE-2021-213xx/CVE-2021-21317.json) (`2024-02-08T20:29:02.863`)
|
||||
* [CVE-2021-41232](CVE-2021/CVE-2021-412xx/CVE-2021-41232.json) (`2024-02-08T20:35:02.133`)
|
||||
* [CVE-2022-42745](CVE-2022/CVE-2022-427xx/CVE-2022-42745.json) (`2024-02-08T19:55:44.273`)
|
||||
* [CVE-2022-27223](CVE-2022/CVE-2022-272xx/CVE-2022-27223.json) (`2024-02-08T20:50:26.827`)
|
||||
* [CVE-2023-37621](CVE-2023/CVE-2023-376xx/CVE-2023-37621.json) (`2024-02-08T19:04:55.887`)
|
||||
* [CVE-2023-20180](CVE-2023/CVE-2023-201xx/CVE-2023-20180.json) (`2024-02-08T19:07:44.363`)
|
||||
* [CVE-2023-20221](CVE-2023/CVE-2023-202xx/CVE-2023-20221.json) (`2024-02-08T19:07:51.023`)
|
||||
* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-02-08T19:25:40.323`)
|
||||
* [CVE-2023-47142](CVE-2023/CVE-2023-471xx/CVE-2023-47142.json) (`2024-02-08T19:32:57.063`)
|
||||
* [CVE-2023-38273](CVE-2023/CVE-2023-382xx/CVE-2023-38273.json) (`2024-02-08T19:35:12.703`)
|
||||
* [CVE-2023-47148](CVE-2023/CVE-2023-471xx/CVE-2023-47148.json) (`2024-02-08T19:58:30.023`)
|
||||
* [CVE-2023-47143](CVE-2023/CVE-2023-471xx/CVE-2023-47143.json) (`2024-02-08T20:00:13.007`)
|
||||
* [CVE-2023-47144](CVE-2023/CVE-2023-471xx/CVE-2023-47144.json) (`2024-02-08T20:01:15.150`)
|
||||
* [CVE-2023-51939](CVE-2023/CVE-2023-519xx/CVE-2023-51939.json) (`2024-02-08T20:11:36.137`)
|
||||
* [CVE-2024-24388](CVE-2024/CVE-2024-243xx/CVE-2024-24388.json) (`2024-02-08T20:04:04.027`)
|
||||
* [CVE-2024-0909](CVE-2024/CVE-2024-09xx/CVE-2024-0909.json) (`2024-02-08T20:07:51.410`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user