Auto-Update: 2024-02-08T19:00:32.755802+00:00

This commit is contained in:
cad-safe-bot 2024-02-08 19:00:36 +00:00
parent 1f24870b3f
commit d350dba50b
31 changed files with 1601 additions and 1069 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0391",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2018-10-30T16:26:22.763",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:38:00.947",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-190"
}
]
}
@ -58,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:freebsd:freebsd:*:release_p5:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.6.1",
"matchCriteriaId": "68AC917F-BDD3-45EB-B169-13A4DF633767"
"matchCriteriaId": "689777D9-7E25-45D5-B585-2FC31D4BE28A"
},
{
"vulnerable": true,
@ -74,8 +96,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6"
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*",
"matchCriteriaId": "BCA7836E-A936-4832-81A2-2D31F0642ABE"
},
{
"vulnerable": true,
@ -95,87 +117,175 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/aix/2002-q4/0002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/hp/2002-q3/0077.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102813809232532&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102821785316087&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102821928418261&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102831443208382&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=103158632831416&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://online.securityfocus.com/advisories/4402",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://online.securityfocus.com/archive/1/285740",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2002-166.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2002-172.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.cert.org/advisories/CA-2002-25.html",
@ -188,78 +298,132 @@
},
{
"url": "http://www.debian.org/security/2002/dsa-142",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-143",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-146",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-149",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2003/dsa-333",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.iss.net/security_center/static/9170.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/192995",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2399.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-167.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-173.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-168.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-212.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/5356",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0639",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-07-03T04:00:00.000",
"lastModified": "2016-10-18T02:20:55.937",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:37:46.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -18,6 +18,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -51,7 +73,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-190"
}
]
}
@ -65,133 +87,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6E307F1-C765-409C-835C-133026A5179C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CA997F5E-29FE-454A-9006-001D732CD4B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78135400-BA1A-42AA-BE17-5588442BCF11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2EDC0-3189-4523-882B-9188C852F793"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2991C07-5486-4590-A74E-46A379DD3339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9BE06-0A36-4853-ADF4-9C1A1854278A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC57F38-6545-497B-B6DA-FCAF51755988"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*",
"matchCriteriaId": "0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*",
"matchCriteriaId": "4B235167-9554-4431-88C5-9472DD36FCDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "580008AC-2667-4708-8F7E-D70416A460EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E05D8E86-EC01-4589-B372-4DEB7845C81F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*",
"matchCriteriaId": "764AD252-CA2F-4A87-BCAA-7747E8C410E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*",
"matchCriteriaId": "269BB9F7-55E5-4CB3-8429-C37C7132799F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E6F639-31A0-4026-B6D4-51BA79FB1D20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0211BCE3-0DED-40BA-8A21-1A97B91F71C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD7BB30-AC79-4153-852C-1053DCF4DE53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E188C66-C8F1-4C13-AAFF-7C83B2A884B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*",
"matchCriteriaId": "9039BE91-AF0A-41E7-8F9F-15375890E120"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08BCB2EA-DF9D-4853-805B-29FA6274E2B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F93417F-2498-4576-9F5D-B59F77D39669"
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.9.9",
"versionEndIncluding": "3.3",
"matchCriteriaId": "E68E2B14-A81E-482E-8DAF-FDDC29FF2158"
}
]
}
@ -201,73 +100,129 @@
"references": [
{
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0335.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102514371522793&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102514631524575&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102521542826833&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://www.cert.org/advisories/CA-2002-18.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-134",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.iss.net/security_center/static/9169.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/369347",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2177.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.osvdb.org/6245",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/5093",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://twitter.com/RooneyMcNibNug/status/1152332585349111810",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://web.archive.org/web/20080622172542/www.iss.net/threats/advise123.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-2013",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2017-07-11T01:31:33.043",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T17:59:17.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-190"
}
]
}
@ -58,698 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6909B816-6778-48A8-A828-CA0AC5484388"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B988FF88-E782-4581-9E24-CDE7E1734258"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9C11B5-5D63-4D2B-AD9A-5E657A8E1D01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F24BEDA8-2D1D-4AA1-8806-02838FB4C323"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAAF0A4-F1B1-4597-B9C1-E7F277061BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AE95DD29-6E5F-475B-BCB3-6F756C62FA16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "19A5A944-8CFC-40ED-96D1-842ECA7316B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F5BF38E2-7353-4A55-ABA3-84085BB5F8CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5C94F0-2390-4AF3-BE18-D00B10A67052"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "134ED367-9610-485D-8935-3C46BFC073AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C150050C-6C08-4434-848D-EB71741DF29E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "08D41FAC-B0CD-48DE-AA43-27487FF9E424"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9CC013-D4FB-4EC0-B405-6B79DF7C2F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "235B7E7D-3785-408A-AE53-7EB4F88F06C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "69A12556-5E7D-4832-A71A-66E6E9C2A710"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9B296A-126A-42E3-B3DD-158F895A48EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC75E5B-48A5-4C28-88B2-870C62DDA337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C3D2EFF1-78E4-4002-8904-9DA13D7D1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "73E02E89-832D-44D9-B2EE-1C070E99AE9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3B55CD0D-0117-48F3-8643-4C191716AE20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "62BA4C24-FD29-421C-8F01-1798764C53F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "726B962B-D8B6-419E-BC0D-3DD9821234F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "985C2754-56B1-4638-B51E-313F7B8BA65F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "746D0402-66BD-4225-B847-6762BC4DC18E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "E657F58A-440D-40CB-97BF-ACB72AB36A3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5E6A99-20FD-456C-A5E2-FEBA5DD672ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "7699FD2E-C211-4E7E-BCA5-B991FBA90EDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "F93B921F-B152-49F3-9AAD-9421F5867F49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "46381F67-EC99-4EA7-9599-BD4A25827E9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "29AC849E-7D4E-4C00-8BD0-672F413A80B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "6996F1F1-5374-4BD2-B421-ABB15C7C0B49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "87E18AFD-5090-4C1F-A2EE-A32A28DB5182"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "FC91B71A-2456-4410-9633-CF5870027D96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "92555500-16EB-4F76-B2C7-61A00A1AC722"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "B03D22C9-94C6-4AC5-AAD0-15F06BCC5CA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "541B4ED8-E970-4C67-B5AF-7DE5B7F754D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "1E55F8A8-1ABD-4760-9074-353BBAEE005B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "F873503F-C6E2-4AC2-859E-9431FE0FA0A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "39E849AC-B85A-4C4F-878B-E95A5F661E1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4A2912-12AC-4DF1-8023-A0B7DBE9A866"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
"matchCriteriaId": "15004105-9A55-4592-96D6-3FF539EC7513"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "146F7A77-A950-4CAD-BDA9-C239696F569D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70DCE8FF-40C3-44F7-8185-0422ADDA051B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAC3A7C-2092-46D4-908B-CF03F4217112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DE77B8D6-EF2A-4EC2-AF75-B6FA48747781"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEC8651-9291-4CAE-AA49-C1CA4C7AE450"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6F3945-21ED-44C6-86D2-B7755A87014E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DDB008-E88E-473C-B030-AF9B6F5E4E48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEF4480-D50B-464C-AE39-A12455DBC99F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "15928E10-7D41-45B2-87D6-8AA10190A8EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E13C4-F42D-4168-B25E-544E1549C46B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
"matchCriteriaId": "1C4B2ABB-0283-4532-9E29-B37BFF5FDFB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
"matchCriteriaId": "C4DADA29-DCD3-44C4-9BDB-B881D6FCE3A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
"matchCriteriaId": "4BD794C6-11F5-4A2B-9A3C-E03069A1526B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C4947CDE-CB89-456B-8B5F-0E17B46BC893"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF701E58-35E8-4DDE-B832-C5A23E61A3CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2498D898-D243-4D0C-9AEF-0138D19A68B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3924060B-1EC1-4003-B306-E327634E7797"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "D45B43DF-FD4C-4C37-9569-1CCE450B8987"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "99879B2B-7FFB-4181-8928-13B7E17F36C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "83A3E250-5BC6-4AD3-A3DE-7F876FD90BE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC74D465-3256-4D87-8F47-C4D7CEA6E2D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*",
"matchCriteriaId": "4817429F-B24F-47E3-BB3B-7EF9036D5F93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:*",
"matchCriteriaId": "1760ADC9-78A1-4133-9720-5319A4CF1DBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*",
"matchCriteriaId": "28ECE0D4-624D-4804-8013-DBA9BAF659ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:*",
"matchCriteriaId": "3C115333-E386-4B4D-91C6-69ECE55666F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:*",
"matchCriteriaId": "C5D62621-2C12-40F0-8726-E48926E4DA44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:*",
"matchCriteriaId": "614F1C35-94B2-4A86-AEB4-55C774445E2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre6:*:*:*:*:*:*",
"matchCriteriaId": "ECDD69D6-F79F-4F0E-BA3D-E721A1885A3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre7:*:*:*:*:*:*",
"matchCriteriaId": "ABCD388A-1E43-492E-8EEC-4E14EDD7AB62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
"matchCriteriaId": "2E244C37-E366-482E-9173-9376D0839839"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
"matchCriteriaId": "11F96BB9-6509-4F1E-9590-E55EE8C6F992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
"matchCriteriaId": "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
"matchCriteriaId": "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
"matchCriteriaId": "718D4631-440E-4783-8966-B2A2D3EF89B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
"matchCriteriaId": "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
"matchCriteriaId": "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
"matchCriteriaId": "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
"matchCriteriaId": "7015F57A-1E3B-42D2-9D12-F695078EFB21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
"matchCriteriaId": "467721EE-5130-46C5-BBB7-0F4878F3F171"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
"matchCriteriaId": "171257E7-12C5-4283-88F7-FFE643995563"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
"matchCriteriaId": "0887E02F-9F36-41F0-9F75-060B8414D7BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
"matchCriteriaId": "D77F8919-4064-4EA5-A948-76178EA21F83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
"matchCriteriaId": "5E7C423D-23DE-4C7B-A518-66F87E041925"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
"matchCriteriaId": "8EA1382E-71B0-4E65-A310-716A244F4FB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
"matchCriteriaId": "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
"matchCriteriaId": "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
"matchCriteriaId": "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
"matchCriteriaId": "824BBD31-8F3B-4F05-981B-ABF662BBF5F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
"matchCriteriaId": "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
"matchCriteriaId": "388A5C99-1F60-4C20-9AE5-6E73E5A3F819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"matchCriteriaId": "5888F8D7-15C2-4435-BB3C-8674DFAF0089"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"matchCriteriaId": "29439AD0-EB8D-4675-A77A-6548FF27ADA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"matchCriteriaId": "F27AADF6-1605-47FC-8C4D-87827A578A90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"matchCriteriaId": "B42F4080-A76F-4D17-85E2-CD2D2E4D0450"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"matchCriteriaId": "6968EF1D-7CC5-430D-866D-206F66486F63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
"matchCriteriaId": "50E6F5C5-BF74-4C10-830A-F232D528D290"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "476687F9-722B-490C-BD0B-B5F2CD7891DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A399D94B-D08D-4454-A07A-6634C9AE612F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
"matchCriteriaId": "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
"matchCriteriaId": "DCD8E4AE-FEF7-4CE2-B338-4F766921593F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
"matchCriteriaId": "13A8B50A-73F6-4FCF-A81F-FB624FBA7143"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
"matchCriteriaId": "8D27D843-2DA7-4481-857C-09FDC4FBD45C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB93128-2743-4668-8C48-9B7282D4A672"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "040991B8-FB4B-480B-B53B-AA7A884F9F19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA592BC-5846-4FC1-B2A7-13E622705DA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
"matchCriteriaId": "59688C40-C92F-431E-ADD7-6782622862D3"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.25",
"matchCriteriaId": "1B690584-D7A7-48E6-8271-B9ABB161034E"
}
]
}
@ -761,21 +94,42 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch"
]
},
{
"url": "http://lists.netsys.com/pipermail/full-disclosure/2004-May/021223.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108456230815842&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/10326",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16117",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-0102",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-01-24T05:00:00.000",
"lastModified": "2018-10-03T21:29:31.683",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:39:13.740",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-190"
}
]
}
@ -58,23 +80,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ximian:evolution:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C678BF17-00A7-497A-B517-C9DCFEBAC4FE"
},
"criteria": "cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.2",
"matchCriteriaId": "C17FC804-1FAB-494A-A397-B2AA576F58B6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ximian:evolution:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "69D43A7F-92EA-492B-B2FD-D7E0D239A705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ximian:evolution:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A844BF-30CC-4289-81C4-1161FDEBC345"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ximian:evolution:1.3.2_beta:*:*:*:*:*:*:*",
"matchCriteriaId": "37D623D7-3570-40A2-BDA8-8D666A9314AB"
"criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3"
}
]
}
@ -86,42 +109,62 @@
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000925",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/13830",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200501-35.xml",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1012981",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-673",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:024",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-238.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-397.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -130,21 +173,34 @@
"url": "http://www.securityfocus.com/bid/12354",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19031",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9616",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://usn.ubuntu.com/69-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-1141",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-04-15T04:00:00.000",
"lastModified": "2016-10-18T03:17:35.157",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:37:12.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-190"
}
]
}
@ -58,28 +80,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gocr:optical_character_recognition_utility:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA591B69-3336-443D-8FBC-23AE40853667"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gocr:optical_character_recognition_utility:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F6B430-EC77-4970-98AB-69575461BBC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gocr:optical_character_recognition_utility:0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "42DE789F-CF85-48F0-B282-C72752E8B46B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gocr:optical_character_recognition_utility:0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "54CAF27E-073A-4617-BC94-98DF1C685497"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gocr:optical_character_recognition_utility:0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C9C2E8-5EF0-44FA-9AD5-0C883A8A5668"
"criteria": "cpe:2.3:a:optical_character_recognition_project:optical_character_recognition:0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C44D6D0A-F07F-47A6-98F1-6405C4D89F78"
}
]
}
@ -89,12 +91,17 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=111358557823673&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://www.overflow.pl/adv/gocr.txt",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Vendor Advisory"
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-1513",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-11T04:00:00.000",
"lastModified": "2023-06-08T17:15:09.390",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:38:11.297",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-190"
}
]
}
@ -62,8 +84,48 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dan_bernstein:qmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10BA8B96-AF8A-41FF-AF37-FE686C9B099C"
"criteria": "cpe:2.3:a:qmail_project:qmail:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA9D55F-8FDA-4B2C-BE43-82BDFEED1C7D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@ -75,82 +137,147 @@
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-05/0101.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "http://packetstormsecurity.com/files/157805/Qualys-Security-Advisory-Qmail-Remote-Code-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/158203/Qmail-Local-Privilege-Escalation-Remote-Code-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2020/Jun/27",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2020/May/42",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jun/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://securitytracker.com/id?1013911",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.guninski.com/where_do_you_want_billg_to_go_today_4.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2020/05/19/8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2020/05/20/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2020/05/20/5",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2020/06/16/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/06/06/3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202007-01",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://usn.ubuntu.com/4556-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2020/dsa-4692",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2010-1866",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-05-07T23:00:01.860",
"lastModified": "2010-09-30T06:00:49.557",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:38:19.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -62,18 +84,50 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF4B938-BB14-4C06-BEE9-10CA755C5DEF"
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3.0",
"versionEndIncluding": "5.3.2",
"matchCriteriaId": "2CFE4CC6-A7C2-414D-9740-45E93282D50A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "981C922C-7A7D-473E-8C43-03AB62FB5B8B"
"criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0CD11A-09C2-4C60-8F0C-68E55BD6EE63"
"criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "1193A7E6-DCB4-4E79-A509-1D6948153A57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "4500161F-13A0-4369-B93A-778B34E7F005"
}
]
}
@ -83,12 +137,16 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://php-security.org/2010/05/02/mops-2010-003-php-dechunk-filter-signed-comparison-vulnerability/index.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-15708",
"sourceIdentifier": "security@ubuntu.com",
"published": "2020-11-06T02:15:12.050",
"lastModified": "2020-11-12T20:09:20.523",
"lastModified": "2024-02-08T17:33:49.730",
"vulnStatus": "Analyzed",
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-35868",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-02-14T11:15:12.847",
"lastModified": "2023-05-09T13:15:15.277",
"vulnStatus": "Modified",
"lastModified": "2024-02-08T18:40:59.770",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -56,7 +56,7 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -64,6 +64,16 @@
"value": "CWE-426"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"configurations": [
@ -100,13 +110,18 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:tia_project-server:16:*:*:*:*:*:*:*",
"matchCriteriaId": "B78BA1A0-16BE-4861-92F7-9D6A2C599B51"
"criteria": "cpe:2.3:a:siemens:tia_project-server:17:-:*:*:*:*:*:*",
"matchCriteriaId": "ED59034F-53F8-43F7-B2A8-749A22DCFC13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:tia_project-server:17:*:*:*:*:*:*:*",
"matchCriteriaId": "A938FD2A-7B26-4F39-ABDF-3622C219D361"
"criteria": "cpe:2.3:a:siemens:tia_project-server:17:update1:*:*:*:*:*:*",
"matchCriteriaId": "F551BE2C-A958-482D-BD6C-D2970CCCCBBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:tia_project-server:17:update4:*:*:*:*:*:*",
"matchCriteriaId": "449FE07D-00D9-44C6-8DD3-CAC06C5F8FBC"
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2023-37621",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-01T09:15:56.177",
"lastModified": "2024-02-01T13:41:44.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T18:45:52.103",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in Fronius Datalogger Web v.2.0.5-4, allows remote attackers to obtain sensitive information via a crafted request."
},
{
"lang": "es",
"value": "Un problema en Fronius Datalogger Web v.2.0.5-4 permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud manipulada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fronius:datalogger_web:2.0.5-4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C918922-0A26-49AA-A64F-3B51AC4E6669"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MY0723/CNVD-2022-27366__CVE-2023-37621",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40547",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-25T16:15:07.717",
"lastModified": "2024-02-07T17:15:09.263",
"lastModified": "2024-02-08T17:15:10.703",
"vulnStatus": "Modified",
"descriptions": [
{
@ -68,6 +68,16 @@
"value": "CWE-787"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-42282",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T17:15:10.840",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in NPM IP Package v.1.1.8 and before allows an attacker to execute arbitrary code and obtain sensitive information via the isPublic() function."
}
],
"metrics": {},
"references": [
{
"url": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44312",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-31T09:15:43.693",
"lastModified": "2024-01-31T18:15:46.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:08:11.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@apache.org",
"type": "Secondary",
@ -40,8 +60,18 @@
},
"weaknesses": [
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,14 +80,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:servicecomb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "42A1CA41-0FBA-401D-BDCB-86E169C784E1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/31/5",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/dkvlgnrmc17qzjdy9k0cr60wpzcssk1s",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44313",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-31T09:15:43.920",
"lastModified": "2024-01-31T18:15:46.207",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:13:28.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@apache.org",
"type": "Secondary",
@ -50,14 +70,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:servicecomb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "42A1CA41-0FBA-401D-BDCB-86E169C784E1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/31/4",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47020",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T16:15:46.377",
"lastModified": "2024-02-08T16:15:46.377",
"vulnStatus": "Received",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50061",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T18:15:08.157",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "PrestaShop Op'art Easy Redirect >= 1.3.8 and <= 1.3.12 is vulnerable to SQL Injection via Oparteasyredirect::hookActionDispatcher()."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.store-opart.fr/p/39-module-redirection-prestashop.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50357",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-01-31T11:15:08.513",
"lastModified": "2024-01-31T14:05:19.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:40:13.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:areal-topkapi:webserv1:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.1",
"matchCriteriaId": "5D9EF891-0F49-4300-AF3B-9645AF9841AE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.areal-topkapi.com/en/services/security-bulletins",
"source": "info@cert.vde.com"
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-5390",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-01-31T18:15:46.780",
"lastModified": "2024-01-31T19:54:51.757",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:18:46.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n\n"
},
{
"lang": "es",
"value": "Un atacante podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la lectura de archivos desde Honeywell Experion ControlEdge VirtualUOC y ControlEdge UOC. Esta explotaci\u00f3n podr\u00eda usarse para leer archivos del controlador que pueden exponer informaci\u00f3n limitada del dispositivo. Honeywell recomienda actualizar a la versi\u00f3n m\u00e1s reciente del producto. Consulte la Notificaci\u00f3n de seguridad de Honeywell para obtener recomendaciones sobre actualizaci\u00f3n y control de versiones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "psirt@honeywell.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "psirt@honeywell.com",
"type": "Secondary",
@ -46,14 +80,76 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B528F553-0D96-4A1D-9ABE-DA9555534BB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E30EFCB6-6534-46EE-A743-2218FD0DAA81"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67C0BF18-A928-4A47-A71E-2216BE4ECB90"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F436C92C-7EED-44A5-B53D-12B54652D0A1"
}
]
}
]
}
],
"references": [
{
"url": "https://process.honeywell.com",
"source": "psirt@honeywell.com"
"source": "psirt@honeywell.com",
"tags": [
"Product"
]
},
{
"url": "https://www.honeywell.com/us/en/product-security",
"source": "psirt@honeywell.com"
"source": "psirt@honeywell.com",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-6258",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-30T17:15:10.657",
"lastModified": "2024-01-30T20:48:58.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:29:26.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been identified in the pkcs11-provider, which is associated with Public-Key Cryptography Standards (PKCS#11). If exploited successfully, this vulnerability could result in a Bleichenbacher-like security flaw, potentially enabling a side-channel attack on PKCS#1 1.5 decryption."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad en el proveedor pkcs11, que est\u00e1 asociado con los est\u00e1ndares de criptograf\u00eda de clave p\u00fablica (PKCS#11). Si se explota con \u00e9xito, esta vulnerabilidad podr\u00eda provocar un fallo de seguridad similar al de Bleichenbacher, lo que podr\u00eda permitir un ataque de canal lateral al descifrado PKCS#1 1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -46,14 +80,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:latchset:pkcs11-provider:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8F4E0EA-859D-43AD-84F2-EEBC0A2BAECF"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251062",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/latchset/pkcs11-provider/pull/308",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-21653",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-30T16:15:47.863",
"lastModified": "2024-01-30T20:48:58.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:33:27.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The vantage6 technology enables to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). Nodes and servers get a ssh config by default that permits root login with password authentication. In a proper deployment, the SSH service is not exposed so there is no risk, but not all deployments are ideal. The default should therefore be less permissive. The vulnerability can be mitigated by removing the ssh part from the docker file and rebuilding the docker image. Version 4.2.0 patches the vulnerability."
},
{
"lang": "es",
"value": "La tecnolog\u00eda vantage6 permite gestionar e implementar tecnolog\u00edas que mejoran la privacidad, como el Federated Learning (FL) y la Multi-Party Computation (MPC). Los nodos y servidores obtienen una configuraci\u00f3n ssh de forma predeterminada que permite el inicio de sesi\u00f3n root con autenticaci\u00f3n de contrase\u00f1a. En una implementaci\u00f3n adecuada, el servicio SSH no queda expuesto por lo que no hay riesgo, pero no todas las implementaciones son ideales. Por lo tanto, el valor predeterminado deber\u00eda ser menos permisivo. La vulnerabilidad se puede mitigar eliminando la parte ssh del archivo docker y reconstruyendo la imagen de la ventana acoplable. La versi\u00f3n 4.2.0 parchea la vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +60,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.0",
"matchCriteriaId": "A9E3A3A7-C004-4E76-B2A3-46F0F1C68AD4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vantage6/vantage6/commit/3fcc6e6a8bd1142fd7a558d8fdd2b246e55c8841",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-2wgc-48g2-cj5w",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-22200",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-30T16:15:48.553",
"lastModified": "2024-01-30T20:48:58.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:01:25.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "vantage6-UI is the User Interface for vantage6. The docker image used to run the UI leaks the nginx version. To mitigate the vulnerability, users can run the UI as an angular application. This vulnerability was patched in 4.2.0.\n"
},
{
"lang": "es",
"value": "vantage6-UI es la interfaz de usuario de vantage6. La imagen de la ventana acoplable utilizada para ejecutar la interfaz de usuario filtra la versi\u00f3n de nginx. Para mitigar la vulnerabilidad, los usuarios pueden ejecutar la interfaz de usuario como una aplicaci\u00f3n de angular. Esta vulnerabilidad fue parcheada en 4.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +60,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vantage6:vantage6-ui:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.2.0",
"matchCriteriaId": "CDABDC62-80CD-4CBD-A86D-7C8A5F054290"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/vantage6/vantage6-UI/commit/92e0fb5102b544d5bcc23980d973573733e2e020",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/vantage6/vantage6-UI/security/advisories/GHSA-8wxq-346h-xmr8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22287",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-31T12:16:05.303",
"lastModified": "2024-01-31T14:05:19.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T17:38:14.320",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ludek:better_anchor_links:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.7.5",
"matchCriteriaId": "7B0830B5-8094-49B7-99BA-3AB99E194D41"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/better-anchor-links/wordpress-better-anchor-links-plugin-1-7-5-csrf-to-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,41 @@
"id": "CVE-2024-23838",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-30T17:15:11.437",
"lastModified": "2024-01-30T20:48:58.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T18:02:03.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the `truelayer-dotnet` library. Versions of TrueLayer.Client `v1.6.0` and later are not affected."
},
{
"lang": "es",
"value": "TrueLayer.NET es el cliente .Net para TrueLayer. La vulnerabilidad podr\u00eda permitir que un actor malintencionado obtenga control sobre la URL de destino del HttpClient utilizado en las clases API. Para las aplicaciones que utilizan el SDK, se podr\u00edan realizar solicitudes a recursos inesperados en redes locales o a Internet, lo que podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n. El problema se puede mitigar teniendo reglas de salida estrictas que limiten los destinos a los que se pueden realizar las solicitudes y aplicando una validaci\u00f3n estricta a cualquier entrada del usuario pasada a la librer\u00eda \"truelayer-dotnet\". Las versiones de TrueLayer.Client `v1.6.0` y posteriores no se ven afectadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
@ -46,14 +72,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:truelayer:truelayer.net:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.0",
"matchCriteriaId": "493E24EB-303F-4003-9051-780D458F0C4C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TrueLayer/truelayer-dotnet/commit/75e436ed5360faa73d6e7ce3a9903a3c49505e3e",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/TrueLayer/truelayer-dotnet/security/advisories/GHSA-67m4-qxp3-j6hh",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-24213",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T18:15:08.237",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query."
}
],
"metrics": {},
"references": [
{
"url": "https://app.flows.sh:8443/project/default%2C",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/940198871/Vulnerability-details/blob/main/CVE-2024-24213",
"source": "cve@mitre.org"
},
{
"url": "https://postfixadmin.ballardini.com.ar:8443/project/default/logs/explorer.",
"source": "cve@mitre.org"
},
{
"url": "https://reference1.example.com/project/default/logs/explorer%2C",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-24321",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T18:15:08.293",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function."
}
],
"metrics": {},
"references": [
{
"url": "http://dir-816a2.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2024-24548",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-01T07:15:09.040",
"lastModified": "2024-02-01T13:41:44.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-08T18:53:14.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Payment EX Ver1.1.5b and earlier allows a remote unauthenticated attacker to obtain the information of the user who purchases merchandise using Payment EX."
},
{
"lang": "es",
"value": "Payment EX Ver1.1.5b y anteriores permiten a un atacante remoto no autenticado obtener la informaci\u00f3n del usuario que compra mercanc\u00edas mediante Payment EX."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:estore-wss:payment_ex:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.1.5b",
"matchCriteriaId": "03636E3C-1C89-4107-91AC-162EE037AC3E"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://jvn.jp/en/jp/JVN41129639/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24834",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-08T14:15:43.083",
"lastModified": "2024-02-08T14:15:43.083",
"vulnStatus": "Received",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-25189",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T17:15:10.960",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "libjwt 1.15.3 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/benmcollins%3Alibjwt.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-25190",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T17:15:11.013",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "l8w8jwt 2.2.1 uses memcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/GlitchedPolygons%3Al8w8jwt.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-25191",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T17:15:11.067",
"lastModified": "2024-02-08T18:42:36.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "php-jwt 1.0.0 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/cdoco%3Aphp-jwt.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-08T17:01:07.115353+00:00
2024-02-08T19:00:32.755802+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-08T16:43:53.780000+00:00
2024-02-08T18:53:14.107000+00:00
```
### Last Data Feed Release
@ -29,56 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
237951
237958
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `7`
* [CVE-2023-7169](CVE-2023/CVE-2023-71xx/CVE-2023-7169.json) (`2024-02-08T13:15:08.417`)
* [CVE-2023-47020](CVE-2023/CVE-2023-470xx/CVE-2023-47020.json) (`2024-02-08T16:15:46.377`)
* [CVE-2024-0985](CVE-2024/CVE-2024-09xx/CVE-2024-0985.json) (`2024-02-08T13:15:08.927`)
* [CVE-2024-1149](CVE-2024/CVE-2024-11xx/CVE-2024-1149.json) (`2024-02-08T13:15:09.147`)
* [CVE-2024-1150](CVE-2024/CVE-2024-11xx/CVE-2024-1150.json) (`2024-02-08T13:15:09.320`)
* [CVE-2024-1312](CVE-2024/CVE-2024-13xx/CVE-2024-1312.json) (`2024-02-08T13:15:09.500`)
* [CVE-2024-24113](CVE-2024/CVE-2024-241xx/CVE-2024-24113.json) (`2024-02-08T13:15:09.807`)
* [CVE-2024-24836](CVE-2024/CVE-2024-248xx/CVE-2024-24836.json) (`2024-02-08T13:15:09.857`)
* [CVE-2024-24871](CVE-2024/CVE-2024-248xx/CVE-2024-24871.json) (`2024-02-08T13:15:10.060`)
* [CVE-2024-24877](CVE-2024/CVE-2024-248xx/CVE-2024-24877.json) (`2024-02-08T13:15:10.253`)
* [CVE-2024-24878](CVE-2024/CVE-2024-248xx/CVE-2024-24878.json) (`2024-02-08T13:15:10.457`)
* [CVE-2024-24834](CVE-2024/CVE-2024-248xx/CVE-2024-24834.json) (`2024-02-08T14:15:43.083`)
* [CVE-2023-42282](CVE-2023/CVE-2023-422xx/CVE-2023-42282.json) (`2024-02-08T17:15:10.840`)
* [CVE-2023-50061](CVE-2023/CVE-2023-500xx/CVE-2023-50061.json) (`2024-02-08T18:15:08.157`)
* [CVE-2024-25189](CVE-2024/CVE-2024-251xx/CVE-2024-25189.json) (`2024-02-08T17:15:10.960`)
* [CVE-2024-25190](CVE-2024/CVE-2024-251xx/CVE-2024-25190.json) (`2024-02-08T17:15:11.013`)
* [CVE-2024-25191](CVE-2024/CVE-2024-251xx/CVE-2024-25191.json) (`2024-02-08T17:15:11.067`)
* [CVE-2024-24213](CVE-2024/CVE-2024-242xx/CVE-2024-24213.json) (`2024-02-08T18:15:08.237`)
* [CVE-2024-24321](CVE-2024/CVE-2024-243xx/CVE-2024-24321.json) (`2024-02-08T18:15:08.293`)
### CVEs modified in the last Commit
Recently modified CVEs: `76`
Recently modified CVEs: `23`
* [CVE-2024-0511](CVE-2024/CVE-2024-05xx/CVE-2024-0511.json) (`2024-02-08T13:44:21.670`)
* [CVE-2024-24091](CVE-2024/CVE-2024-240xx/CVE-2024-24091.json) (`2024-02-08T13:44:21.670`)
* [CVE-2024-24216](CVE-2024/CVE-2024-242xx/CVE-2024-24216.json) (`2024-02-08T13:44:21.670`)
* [CVE-2024-0965](CVE-2024/CVE-2024-09xx/CVE-2024-0965.json) (`2024-02-08T13:44:21.670`)
* [CVE-2024-1207](CVE-2024/CVE-2024-12xx/CVE-2024-1207.json) (`2024-02-08T13:44:21.670`)
* [CVE-2024-24034](CVE-2024/CVE-2024-240xx/CVE-2024-24034.json) (`2024-02-08T13:44:21.670`)
* [CVE-2024-21484](CVE-2024/CVE-2024-214xx/CVE-2024-21484.json) (`2024-02-08T14:15:42.853`)
* [CVE-2024-23452](CVE-2024/CVE-2024-234xx/CVE-2024-23452.json) (`2024-02-08T14:15:42.980`)
* [CVE-2024-1047](CVE-2024/CVE-2024-10xx/CVE-2024-1047.json) (`2024-02-08T14:20:23.387`)
* [CVE-2024-1162](CVE-2024/CVE-2024-11xx/CVE-2024-1162.json) (`2024-02-08T14:22:37.180`)
* [CVE-2024-0844](CVE-2024/CVE-2024-08xx/CVE-2024-0844.json) (`2024-02-08T16:15:39.903`)
* [CVE-2024-1019](CVE-2024/CVE-2024-10xx/CVE-2024-1019.json) (`2024-02-08T16:35:08.863`)
* [CVE-2024-0564](CVE-2024/CVE-2024-05xx/CVE-2024-0564.json) (`2024-02-08T16:36:48.837`)
* [CVE-2024-0963](CVE-2024/CVE-2024-09xx/CVE-2024-0963.json) (`2024-02-08T16:37:57.733`)
* [CVE-2024-0676](CVE-2024/CVE-2024-06xx/CVE-2024-0676.json) (`2024-02-08T16:39:00.907`)
* [CVE-2024-23834](CVE-2024/CVE-2024-238xx/CVE-2024-23834.json) (`2024-02-08T16:39:31.963`)
* [CVE-2024-0675](CVE-2024/CVE-2024-06xx/CVE-2024-0675.json) (`2024-02-08T16:39:42.950`)
* [CVE-2024-0674](CVE-2024/CVE-2024-06xx/CVE-2024-0674.json) (`2024-02-08T16:39:59.450`)
* [CVE-2024-22894](CVE-2024/CVE-2024-228xx/CVE-2024-22894.json) (`2024-02-08T16:40:42.490`)
* [CVE-2024-22193](CVE-2024/CVE-2024-221xx/CVE-2024-22193.json) (`2024-02-08T16:41:38.277`)
* [CVE-2024-0788](CVE-2024/CVE-2024-07xx/CVE-2024-0788.json) (`2024-02-08T16:42:27.363`)
* [CVE-2024-23827](CVE-2024/CVE-2024-238xx/CVE-2024-23827.json) (`2024-02-08T16:42:39.110`)
* [CVE-2024-21671](CVE-2024/CVE-2024-216xx/CVE-2024-21671.json) (`2024-02-08T16:42:41.923`)
* [CVE-2024-23826](CVE-2024/CVE-2024-238xx/CVE-2024-23826.json) (`2024-02-08T16:43:13.403`)
* [CVE-2024-21649](CVE-2024/CVE-2024-216xx/CVE-2024-21649.json) (`2024-02-08T16:43:53.780`)
* [CVE-2002-0639](CVE-2002/CVE-2002-06xx/CVE-2002-0639.json) (`2024-02-08T18:37:46.120`)
* [CVE-2002-0391](CVE-2002/CVE-2002-03xx/CVE-2002-0391.json) (`2024-02-08T18:38:00.947`)
* [CVE-2004-2013](CVE-2004/CVE-2004-20xx/CVE-2004-2013.json) (`2024-02-08T17:59:17.197`)
* [CVE-2005-1141](CVE-2005/CVE-2005-11xx/CVE-2005-1141.json) (`2024-02-08T18:37:12.213`)
* [CVE-2005-1513](CVE-2005/CVE-2005-15xx/CVE-2005-1513.json) (`2024-02-08T18:38:11.297`)
* [CVE-2005-0102](CVE-2005/CVE-2005-01xx/CVE-2005-0102.json) (`2024-02-08T18:39:13.740`)
* [CVE-2010-1866](CVE-2010/CVE-2010-18xx/CVE-2010-1866.json) (`2024-02-08T18:38:19.200`)
* [CVE-2020-15708](CVE-2020/CVE-2020-157xx/CVE-2020-15708.json) (`2024-02-08T17:33:49.730`)
* [CVE-2022-35868](CVE-2022/CVE-2022-358xx/CVE-2022-35868.json) (`2024-02-08T18:40:59.770`)
* [CVE-2023-44312](CVE-2023/CVE-2023-443xx/CVE-2023-44312.json) (`2024-02-08T17:08:11.110`)
* [CVE-2023-44313](CVE-2023/CVE-2023-443xx/CVE-2023-44313.json) (`2024-02-08T17:13:28.083`)
* [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-02-08T17:15:10.703`)
* [CVE-2023-5390](CVE-2023/CVE-2023-53xx/CVE-2023-5390.json) (`2024-02-08T17:18:46.787`)
* [CVE-2023-6258](CVE-2023/CVE-2023-62xx/CVE-2023-6258.json) (`2024-02-08T17:29:26.097`)
* [CVE-2023-50357](CVE-2023/CVE-2023-503xx/CVE-2023-50357.json) (`2024-02-08T17:40:13.563`)
* [CVE-2023-47020](CVE-2023/CVE-2023-470xx/CVE-2023-47020.json) (`2024-02-08T18:42:36.577`)
* [CVE-2023-37621](CVE-2023/CVE-2023-376xx/CVE-2023-37621.json) (`2024-02-08T18:45:52.103`)
* [CVE-2024-22200](CVE-2024/CVE-2024-222xx/CVE-2024-22200.json) (`2024-02-08T17:01:25.927`)
* [CVE-2024-21653](CVE-2024/CVE-2024-216xx/CVE-2024-21653.json) (`2024-02-08T17:33:27.273`)
* [CVE-2024-22287](CVE-2024/CVE-2024-222xx/CVE-2024-22287.json) (`2024-02-08T17:38:14.320`)
* [CVE-2024-23838](CVE-2024/CVE-2024-238xx/CVE-2024-23838.json) (`2024-02-08T18:02:03.540`)
* [CVE-2024-24834](CVE-2024/CVE-2024-248xx/CVE-2024-24834.json) (`2024-02-08T18:42:36.577`)
* [CVE-2024-24548](CVE-2024/CVE-2024-245xx/CVE-2024-24548.json) (`2024-02-08T18:53:14.107`)
## Download and Usage