Auto-Update: 2023-12-28T17:00:24.440800+00:00

This commit is contained in:
cad-safe-bot 2023-12-28 17:00:28 +00:00
parent 4ef21c8cbd
commit e502d34b13
169 changed files with 4964 additions and 1740 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2002-1912",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2008-09-05T20:31:50.027",
"lastModified": "2023-12-28T15:29:29.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-476"
}
]
}
@ -81,17 +103,35 @@
"url": "http://www.globalintersec.com/adv/skystream-2002021001.txt",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch"
]
},
{
"url": "http://www.iss.net/security_center/static/10380.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/295516",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/5977",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0079",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-11-23T05:00:00.000",
"lastModified": "2021-11-08T15:48:31.713",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:33:29.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -22,6 +22,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -55,14 +77,13 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -118,7 +139,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -1364,173 +1384,325 @@
"references": [
{
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://docs.info.apple.com/article.html?artnum=61798",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=107953412903636&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108403806509920&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/11139",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17381",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17398",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/17401",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/18247",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200403-03.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.ciac.org/ciac/bulletins/o-101.shtml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2004/dsa-465",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/288574",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.openssl.org/news/secadv_20040317.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-120.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-121.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-139.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-829.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-830.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/9899",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
"source": "cve@mitre.org"
},
{
"url": "http://www.trustix.org/errata/2004/0012",
"source": "cve@mitre.org"
},
{
"url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
"source": "cve@mitre.org"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openssl.org/news/secadv_20040317.txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-120.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-121.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-139.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-829.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-830.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/9899",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.trustix.org/errata/2004/0012",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0365",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-05-04T04:00:00.000",
"lastModified": "2017-10-11T01:29:24.950",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:33:14.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-476"
}
]
}
@ -62,123 +84,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3240376B-44CB-4BF3-9EA6-05841FE70AF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D1329DA0-3B95-4BCB-9A2C-4C5F882B9208"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.18:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC35478-9276-4732-9F0D-13CA958C617C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.8.19:*:*:*:*:*:*:*",
"matchCriteriaId": "77000951-EF3E-41D8-8545-497BA3E5C5E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "83C48EC3-D0BA-4A5D-93B0-6931CB3587AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CB461B6B-B731-4732-AAD0-191BE50189D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "19961880-D38A-4785-A7C5-879A061119BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "831705D2-C4DE-475F-B908-8859064AFB38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A4622585-20E2-46E9-B773-74729FF22EEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E86ADCB6-0940-4CB9-85F1-A7694210FB66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "042B6289-D2E2-4369-BB40-EA6EE7025D23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C93D7B7E-F5F9-44A2-A87B-4A16634DEDAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0A48938-30B8-4403-B08A-177FFCB9054B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A33AA4-CABF-4B6B-8688-8C1BD36D6649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "67B81EFD-27C1-411C-AFF3-E5340627E3BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "680934CF-7F9B-41E4-AA03-ECD96F477AB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1F3D3E-A6D6-4C1A-8BC6-5579C19A7A45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCF3AFF-ED4D-40F6-A2DD-04C0A6D3BD64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DBCCE368-64E6-4CEC-B068-9B8BA2527289"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5374A4-5194-45FD-895D-B04FDC7E853C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"matchCriteriaId": "4038BC6D-DE51-4F1C-A25C-CD7FC6CE8CF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "338CEFD7-EBC0-43FB-B482-9A3D0834447E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "136FF83B-2B03-4E5F-95C1-84195BE8392A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "898E6919-542F-4A31-8CC0-C3C4CE0F9FCF"
"criteria": "cpe:2.3:a:ethereal:ethereal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.8.13",
"versionEndExcluding": "0.10.3",
"matchCriteriaId": "6AE67AED-041A-4617-A33A-0DEEB6BE2428"
}
]
}
@ -188,65 +97,110 @@
"references": [
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108058005324316&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=108213710306260&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=ethereal-dev&m=107962966700423&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/11185",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200403-07.xml",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://www.ethereal.com/appnotes/enpa-sa-00013.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/124454",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:024",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-136.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-137.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15571",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A879",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A891",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9196",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2005-0772",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-06-28T04:00:00.000",
"lastModified": "2011-03-08T02:20:33.987",
"lastModified": "2023-12-28T15:29:13.657",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-476"
}
]
}
@ -58,13 +80,17 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B94533F3-8954-4772-92A6-7E3EE29D3162"
"criteria": "cpe:2.3:a:veritas:backup_exec:*:*:*:*:*:windows_server:*:*",
"versionStartIncluding": "9.0",
"versionEndIncluding": "10.0",
"matchCriteriaId": "4617C98D-7BD0-4FC7-B8DE-897ABD0F6619"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:symantec_veritas:backup_exec:10.0_sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "847A5F3C-9BA7-4386-B95D-42F661FE95F9"
"criteria": "cpe:2.3:a:veritas:backup_exec:*:*:*:*:*:netware:*:*",
"versionStartIncluding": "9.0.4019",
"versionEndIncluding": "9.1.307",
"matchCriteriaId": "575E4939-6B49-4153-B2F6-65D98E6912E5"
}
]
}
@ -72,28 +98,50 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/15789",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1014273",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seer.support.veritas.com/docs/276533.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://seer.support.veritas.com/docs/277485.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=270&type=vulnerabilities&flashstatus=true",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.idefense.com/application/poi/display?id=271&type=vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-0062",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-03-19T10:44:00.000",
"lastModified": "2018-10-15T21:57:08.323",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:34:12.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -55,34 +77,7 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C73BED9E-29FB-4965-B38F-013FFE5A9170"
}
]
},
{
"operator": "OR",
"negate": false,
@ -90,8 +85,78 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.3_kdc",
"matchCriteriaId": "18C8F666-E82A-40B8-B425-8575057FBB7F"
"versionEndIncluding": "1.6.3",
"matchCriteriaId": "904FBF9F-9269-4088-BD5A-3C773E6F841E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EFD171-01F7-450B-B6F3-0F7E443A2337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*",
"matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F"
}
]
}
@ -101,145 +166,351 @@
"references": [
{
"url": "http://docs.info.apple.com/article.html?artnum=307562",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=130497213107107&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/29420",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29423",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29424",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29428",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29435",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29438",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29450",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29451",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29457",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29462",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29464",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29516",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29663",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/30535",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Third Party Advisory"
]
},
{
"url": "http://wiki.rpath.com/Advisories:rPSA-2008-0112",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2008/dsa-1524",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/895609",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:069",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:070",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:071",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0164.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0180.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0181.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0182.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/489761",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/489883/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/28303",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1019626",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-587-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0922/references",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/0924/references",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1102/references",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/1744",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41275",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9496",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-3597",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-08-12T17:41:00.000",
"lastModified": "2017-08-08T01:32:01.293",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:28:39.323",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-476"
}
]
}
@ -62,158 +84,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.94c:*:*:*:*:*:*:*",
"matchCriteriaId": "E791F863-F7B0-42D0-B06A-085213B04F18"
"criteria": "cpe:2.3:a:skulltag:skulltag:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.97d2",
"matchCriteriaId": "927C6D8E-F899-4B85-883A-317FD88E8AF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95b:*:*:*:*:*:*:*",
"matchCriteriaId": "6A289784-DBB4-41F1-918E-ADBCFAEEC577"
"criteria": "cpe:2.3:a:skulltag:skulltag:0.97d2:-:*:*:*:*:*:*",
"matchCriteriaId": "86EB1188-EF3C-46D4-A3B9-F1704C7CE85E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95c:*:*:*:*:*:*:*",
"matchCriteriaId": "E08AE280-B3AB-44FA-9FD6-F9C8B22D169F"
"criteria": "cpe:2.3:a:skulltag:skulltag:0.97d2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "80D71FBC-1EBD-4082-9172-31465DD4DA8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95d:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB3C295-BE0A-4804-8565-79264AD92A4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95e:*:*:*:*:*:*:*",
"matchCriteriaId": "75CA2F11-52DE-4C6E-9E7F-633BD804B51C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95f:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF345AE-66EA-49DB-A145-7B6CC147AEC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95g:*:*:*:*:*:*:*",
"matchCriteriaId": "CB36C355-2008-4EAE-AEBA-376B7C3E208B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95h:*:*:*:*:*:*:*",
"matchCriteriaId": "86912E64-4EF5-438C-8B14-9AA9353BD417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95i:*:*:*:*:*:*:*",
"matchCriteriaId": "D7506853-54FC-4908-B0C4-5D5BFE7BEEA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95j:*:*:*:*:*:*:*",
"matchCriteriaId": "E778DEF7-B84F-4813-9449-580A6B071E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.95k:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F884F3-771F-4D65-8BBD-C9E3952ACC9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.96b:*:*:*:*:*:*:*",
"matchCriteriaId": "A621B560-4A27-4E89-8834-76BE60CCCBD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.96c:*:*:*:*:*:*:*",
"matchCriteriaId": "336E52F7-6299-45A6-9E9D-03F2C8FC3A83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.96d:*:*:*:*:*:*:*",
"matchCriteriaId": "DE120A44-3949-4115-8B0B-02E002D00525"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.96e:*:*:*:*:*:*:*",
"matchCriteriaId": "585EC565-42FF-4BAA-B105-05F583FE6E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.96f:*:*:*:*:*:*:*",
"matchCriteriaId": "B2548734-EABD-46A5-9BFB-CB09F1AC7257"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97b:*:*:*:*:*:*:*",
"matchCriteriaId": "E3D39A0F-938E-42F0-BA02-EB3E7D9E928C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97c:*:*:*:*:*:*:*",
"matchCriteriaId": "5B728246-CE98-4AA9-8E05-D266B8349FC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97c2:*:*:*:*:*:*:*",
"matchCriteriaId": "03DF74FF-96EC-40D9-8E4F-03586B3AF149"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97c3:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C4A89C-EABB-4E3B-818A-104F4433A154"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6EE64A-95E6-409D-A6A1-CD81EDD242A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_1:*:*:*:*:*:*",
"matchCriteriaId": "EB44B149-7368-4B90-8B86-EA6D1664B691"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_2:*:*:*:*:*:*",
"matchCriteriaId": "B71BC65B-ECDB-49A2-A322-F201EA7998A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_3:*:*:*:*:*:*",
"matchCriteriaId": "AD70CF45-2F6D-4618-AEBA-CFEE08F1A7DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_4:*:*:*:*:*:*",
"matchCriteriaId": "48187081-98A4-440D-B615-E3B0FE78E93A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_4.1:*:*:*:*:*:*",
"matchCriteriaId": "34637E02-713C-4A07-A24E-4AA5A5751671"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:rc10:*:*:*:*:*:*",
"matchCriteriaId": "2C510EA6-998D-442B-B25B-729FF738A86B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d:rc9:*:*:*:*:*:*",
"matchCriteriaId": "94AC2093-8D95-4360-9B39-6C105563165A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD03F691-C0FC-44DE-8BFA-E0F125574832"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E6E3DC9A-A4DE-4858-B3F7-367F96E2825A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skulltag_team:skulltag:0.97d2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "6A962844-4FA4-411C-81D7-A145E6359D12"
"criteria": "cpe:2.3:a:skulltag:skulltag:0.97d2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C577331C-A4E6-422E-8195-F7947BD5044C"
}
]
}
@ -223,22 +111,41 @@
"references": [
{
"url": "http://aluigi.altervista.org/adv/skulltagod-adv.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/31427",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://skulltag.com/forum/viewtopic.php?f=1&t=14716",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2008/2325",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44363",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2008-5183",
"sourceIdentifier": "security@ubuntu.com",
"published": "2008-11-21T02:30:00.453",
"lastModified": "2017-09-29T01:32:30.087",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:35:17.220",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-476"
}
]
}
@ -63,383 +85,65 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.7",
"matchCriteriaId": "6E8DB5A3-0C79-4D3D-BF78-7448D527B670"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D89E03-94D0-4F7F-9A54-3021E3E5A321"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298D6BE7-7683-4225-8DD6-4C0FC5EB48BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "230B77E7-B1AE-4470-859D-7B5F99749D74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6070FC-4566-4314-940E-0AAE34B56E28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BC691F07-8B38-4867-AB18-51F380CAEA46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"matchCriteriaId": "E943EFBF-39A7-408F-8AC5-677E83DFDBB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA7725A-4398-4C76-BEBF-10E56C7F34F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7415295-0FBF-4946-8D99-8CB2EC391319"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C702EE3-4B7C-42EA-92AA-8717807CF67C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"matchCriteriaId": "73F74581-D71C-4FEC-BA8C-85EF4C1991BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABCFB52-33D3-428C-B1D5-DCE504170A37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "45F03F2B-6AC3-4872-9032-293C2E9B837C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7E02B6FB-C36D-45F3-95F3-566CA03B29A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "96093309-A87D-48D0-84DA-446255ABF231"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF67F149-614B-4507-A15F-E557A1B73423"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"matchCriteriaId": "49862F77-B8DE-4AA7-AE17-B348B05AC00E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "78D7719F-03E0-4E66-A50A-F8E857A9B6AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F3139FDA-9476-4414-B349-7119E63FD268"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "523FE78C-441F-4ACD-B9F2-3E5293E277AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F887B5B1-7528-4086-AE6C-134F54A93342"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C5C552-6276-4791-80CD-6B3EB425EF04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5279D055-248A-4BD1-9FBB-0024BA16DF5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "16519855-FCB9-44A8-9C7E-116192327BAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1D9330B-C51A-4C7D-A322-85103C64D86C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2DA0C19F-95EB-429C-AF06-A2C1D5643662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "225CCE80-FF4B-4B39-B8BD-EB4710047524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "07925DD8-50C0-4908-95D1-7342A4617BBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "48A519DB-6C6D-4094-814D-33BD5EF389BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B6ED7566-5092-4B08-97A9-B2B53117A224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "98DCAC0C-896F-4353-A665-5BCD0D8AEBA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E72614CD-8F70-4E07-AD83-8FDE8026CEC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"matchCriteriaId": "48E62419-C165-4B42-8C23-E24821BD4BB4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"matchCriteriaId": "217D804B-CA56-49CE-B9EB-2A297EB1763C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"matchCriteriaId": "A41E8583-C837-4871-B4D2-FD41C78D538E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D480C37B-0DA8-4096-80B0-5198FE589A4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"matchCriteriaId": "74F5A83B-3C1A-49F3-A9D6-F7B9B897E447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"matchCriteriaId": "241D4183-879D-4974-BACB-A6987EDA2E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8758715D-B973-4960-8B7D-6F9A11E73288"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0370E9EB-B830-4362-B83C-912579695691"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D644926A-C2A5-45FE-85A3-2782CE87ED86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "AFB34629-DB13-4164-8A18-BD818E50528B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*",
"matchCriteriaId": "2D432471-B5FD-4B1D-82DF-6F3152752071"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "960DE41E-63DB-45EB-9B19-6349BDA05086"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A57D2299-3409-4907-9FC0-5C3C715CDB37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C7EB92FA-3669-4530-BE69-84CF01D98FF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0696E675-0A13-45FC-8917-845E6FF7A311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78BAC98C-1FE6-42A3-8B62-E3C321914F6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC3EF2F-0140-4185-9FB3-2B595B61CDC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7C36785A-F735-45C0-986B-9624AD65F0C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1D3916-607F-44E8-9D47-93C6C0789083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "174613C3-A04B-4701-849B-BAA598BF4F72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "81C1137C-BE3D-45F9-83C9-D212107F0E14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBC1F81-E93A-42A7-8BC8-4B903688F2E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA876FF-C58A-45CF-A8E8-E2068DF79421"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD78771-BD9A-4AC2-B664-B189DD288FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "50A16424-732F-4B76-A753-1642A97BC1EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E189C976-2DD2-485C-828E-7FC3DC6A8F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A86CA90F-A944-4F3E-B75F-8147125335D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "690C4DEC-1467-4D7D-8E73-6EE1758439D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FB5CA96B-411E-47BE-81A1-1C2E240A25F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "AA5A29C9-1913-4B8F-B162-66E71BEABD1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FAFABDC-E40F-4C53-AC66-94EFD077665D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F96C1B80-9E20-4832-8308-BF7911569EF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2D7DB3-F467-4BC0-83BB-4706D067A2C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46C394DC-65A7-4713-B823-6F5D329A0C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E9F74F-3C7D-486A-8BA1-EE2A73160B39"
"versionEndIncluding": "1.3.9",
"matchCriteriaId": "B4E90153-8D18-4A50-9581-895C851F6489"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.5.6",
"matchCriteriaId": "A9759850-4805-447C-AF3F-5CD462E24810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.5.6",
"matchCriteriaId": "2779F6D3-C4B4-4600-88EF-24B26741CEB8"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
}
]
}
@ -449,79 +153,156 @@
"references": [
{
"url": "http://lab.gnucitizen.org/projects/cups-0day",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/33937",
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/43521",
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://support.apple.com/kb/HT3438",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2011/dsa-2176",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/11/19/3",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/11/19/4",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2008/11/20/1",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-1029.html",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/32419",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1021396",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/0422",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0535",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46684",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.exploit-db.com/exploits/7150",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-0949",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-06-09T17:30:00.657",
"lastModified": "2018-10-10T19:32:33.693",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:21:37.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-476"
}
]
}
@ -63,393 +85,101 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.9",
"matchCriteriaId": "B4E90153-8D18-4A50-9581-895C851F6489"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D89E03-94D0-4F7F-9A54-3021E3E5A321"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298D6BE7-7683-4225-8DD6-4C0FC5EB48BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "230B77E7-B1AE-4470-859D-7B5F99749D74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7"
},
"versionEndExcluding": "1.3.10",
"matchCriteriaId": "DB4D1818-1AE2-42FE-9856-5519EF7E0DAA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6070FC-4566-4314-940E-0AAE34B56E28"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BC691F07-8B38-4867-AB18-51F380CAEA46"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"matchCriteriaId": "E943EFBF-39A7-408F-8AC5-677E83DFDBB4"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA7725A-4398-4C76-BEBF-10E56C7F34F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D7415295-0FBF-4946-8D99-8CB2EC391319"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C702EE3-4B7C-42EA-92AA-8717807CF67C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"matchCriteriaId": "73F74581-D71C-4FEC-BA8C-85EF4C1991BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABCFB52-33D3-428C-B1D5-DCE504170A37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "45F03F2B-6AC3-4872-9032-293C2E9B837C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7E02B6FB-C36D-45F3-95F3-566CA03B29A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "96093309-A87D-48D0-84DA-446255ABF231"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF67F149-614B-4507-A15F-E557A1B73423"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"matchCriteriaId": "49862F77-B8DE-4AA7-AE17-B348B05AC00E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "78D7719F-03E0-4E66-A50A-F8E857A9B6AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F3139FDA-9476-4414-B349-7119E63FD268"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "523FE78C-441F-4ACD-B9F2-3E5293E277AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F887B5B1-7528-4086-AE6C-134F54A93342"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C5C552-6276-4791-80CD-6B3EB425EF04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5279D055-248A-4BD1-9FBB-0024BA16DF5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "16519855-FCB9-44A8-9C7E-116192327BAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1D9330B-C51A-4C7D-A322-85103C64D86C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2DA0C19F-95EB-429C-AF06-A2C1D5643662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "225CCE80-FF4B-4B39-B8BD-EB4710047524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "07925DD8-50C0-4908-95D1-7342A4617BBC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "48A519DB-6C6D-4094-814D-33BD5EF389BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B6ED7566-5092-4B08-97A9-B2B53117A224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "98DCAC0C-896F-4353-A665-5BCD0D8AEBA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E72614CD-8F70-4E07-AD83-8FDE8026CEC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"matchCriteriaId": "48E62419-C165-4B42-8C23-E24821BD4BB4"
},
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"matchCriteriaId": "217D804B-CA56-49CE-B9EB-2A297EB1763C"
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"matchCriteriaId": "A41E8583-C837-4871-B4D2-FD41C78D538E"
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D480C37B-0DA8-4096-80B0-5198FE589A4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"matchCriteriaId": "74F5A83B-3C1A-49F3-A9D6-F7B9B897E447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"matchCriteriaId": "241D4183-879D-4974-BACB-A6987EDA2E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8758715D-B973-4960-8B7D-6F9A11E73288"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0370E9EB-B830-4362-B83C-912579695691"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D644926A-C2A5-45FE-85A3-2782CE87ED86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "AFB34629-DB13-4164-8A18-BD818E50528B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*",
"matchCriteriaId": "2D432471-B5FD-4B1D-82DF-6F3152752071"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "960DE41E-63DB-45EB-9B19-6349BDA05086"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A57D2299-3409-4907-9FC0-5C3C715CDB37"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C7EB92FA-3669-4530-BE69-84CF01D98FF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0696E675-0A13-45FC-8917-845E6FF7A311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78BAC98C-1FE6-42A3-8B62-E3C321914F6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC3EF2F-0140-4185-9FB3-2B595B61CDC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7C36785A-F735-45C0-986B-9624AD65F0C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1D3916-607F-44E8-9D47-93C6C0789083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "174613C3-A04B-4701-849B-BAA598BF4F72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "81C1137C-BE3D-45F9-83C9-D212107F0E14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBC1F81-E93A-42A7-8BC8-4B903688F2E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA876FF-C58A-45CF-A8E8-E2068DF79421"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD78771-BD9A-4AC2-B664-B189DD288FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "50A16424-732F-4B76-A753-1642A97BC1EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E189C976-2DD2-485C-828E-7FC3DC6A8F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A86CA90F-A944-4F3E-B75F-8147125335D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "690C4DEC-1467-4D7D-8E73-6EE1758439D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FB5CA96B-411E-47BE-81A1-1C2E240A25F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "AA5A29C9-1913-4B8F-B162-66E71BEABD1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FAFABDC-E40F-4C53-AC66-94EFD077665D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F96C1B80-9E20-4832-8308-BF7911569EF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2D7DB3-F467-4BC0-83BB-4706D067A2C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F"
},
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46C394DC-65A7-4713-B823-6F5D329A0C5C"
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.4.11",
"matchCriteriaId": "2F5DEE66-117C-4844-8FD4-065D0820A808"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E9F74F-3C7D-486A-8BA1-EE2A73160B39"
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.0",
"versionEndExcluding": "10.5.8",
"matchCriteriaId": "7A880FA4-5DBF-4894-8DAC-C3CD147D1EB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "69BD64BB-BDA7-4F82-8324-B7C7C941133C"
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.4.11",
"matchCriteriaId": "B9ACE85A-56A0-404C-AB58-A4F5CA73243C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16"
"criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.0",
"versionEndExcluding": "10.5.8",
"matchCriteriaId": "7F74FAC0-CC05-4797-9DE2-F7CE5CB8FC19"
}
]
}
@ -459,68 +189,156 @@
"references": [
{
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/35322",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/35328",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/35340",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/35342",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/35685",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36701",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1022321",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://support.apple.com/kb/HT3865",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1811",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2009-1082.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2009-1083.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/504032/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/35169",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-780-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50926",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-2698",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-08-27T17:30:00.233",
"lastModified": "2023-11-07T02:04:12.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-28T15:22:01.253",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -22,6 +22,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -131,12 +153,105 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
"matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7F2976D5-83A5-4A52-A1E6-D0E17F23FD62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "941713DB-B1DE-4953-9A9C-174EAFDCB3E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "73322DEE-27A6-4D18-88A3-ED7F9CAEABD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1F87B994-28E4-4095-8770-6433DE9C93AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B5DCF29-6830-45FF-BC88-17E2249C653D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D467EE9D-6A1F-4462-9BDA-C68B7EE375E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D"
}
]
}
]
}
],
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00008.html",
@ -150,20 +265,21 @@
"url": "http://rhn.redhat.com/errata/RHSA-2009-1222.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2009-1223.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/23073",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -171,6 +287,7 @@
"url": "http://secunia.com/advisories/36430",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -178,6 +295,7 @@
"url": "http://secunia.com/advisories/36510",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -185,6 +303,7 @@
"url": "http://secunia.com/advisories/37105",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -192,6 +311,7 @@
"url": "http://secunia.com/advisories/37298",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -199,6 +319,7 @@
"url": "http://secunia.com/advisories/37471",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -213,6 +334,7 @@
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -220,6 +342,7 @@
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:051",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -234,6 +357,7 @@
"url": "http://www.redhat.com/support/errata/RHSA-2009-1233.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -241,6 +365,7 @@
"url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -249,6 +374,7 @@
"url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -257,6 +383,7 @@
"url": "http://www.securityfocus.com/bid/36108",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
@ -267,6 +394,7 @@
"url": "http://www.securitytracker.com/id?1022761",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -304,6 +432,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11514",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -311,6 +440,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8557",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -318,6 +448,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9142",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-4895",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-09-08T20:00:02.620",
"lastModified": "2023-11-07T02:04:53.470",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-28T15:22:24.383",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -49,6 +71,10 @@
{
"lang": "en",
"value": "CWE-362"
},
{
"lang": "en",
"value": "CWE-476"
}
]
}
@ -129,7 +155,10 @@
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=703625118069f9f8960d356676662d3db5a9d116",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2010/dsa-2094",
@ -190,8 +219,7 @@
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
"Patch"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-13147",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-02T00:15:10.397",
"lastModified": "2023-11-12T23:15:07.857",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:58:45.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -90,6 +90,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
@ -103,7 +118,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26443",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:16:35.060",
"lastModified": "2021-11-10T16:01:42.403",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:46.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-26444",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:16:35.257",
"lastModified": "2021-11-17T03:31:23.590",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:47.200",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-42301, CVE-2021-42323."
"value": "Azure RTOS Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28117",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-03-20T21:15:11.827",
"lastModified": "2023-11-16T22:15:27.497",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T16:24:49.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -96,7 +96,10 @@
"references": [
{
"url": "https://github.com/KDE/discover/commit/fcd3b30552bf03a384b1a16f9bb8db029c111356",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/KDE/discover/releases",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36957",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:17:55.947",
"lastModified": "2021-11-10T15:44:38.960",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:47.430",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-38631",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:18:34.993",
"lastModified": "2021-11-12T18:59:17.390",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:47.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41371."
"value": "Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38665",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:18:35.180",
"lastModified": "2021-11-10T18:37:52.727",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:47.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38666",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:18:35.350",
"lastModified": "2021-11-10T16:38:58.247",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:48.077",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-40442",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:18.077",
"lastModified": "2021-11-10T18:47:38.487",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:48.297",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-40457",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-10-13T01:15:09.937",
"lastModified": "2021-10-19T17:35:05.743",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:48.583",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41349",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:28.653",
"lastModified": "2021-11-10T17:39:14.420",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:49.513",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305."
"value": "Microsoft Exchange Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41351",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:28.947",
"lastModified": "2021-11-10T17:51:38.867",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:49.793",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41352",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-10-13T01:15:13.683",
"lastModified": "2021-10-19T17:37:00.433",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:50.037",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41356",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:29.197",
"lastModified": "2021-11-10T17:29:05.583",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:50.600",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41363",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-10-13T01:15:14.103",
"lastModified": "2021-10-19T19:22:08.270",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:50.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41366",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:29.403",
"lastModified": "2021-11-12T18:56:25.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:51.123",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41367",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:29.603",
"lastModified": "2021-11-12T18:57:25.817",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:51.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41370, CVE-2021-42283."
"value": "NTFS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41368",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:29.810",
"lastModified": "2021-11-12T17:13:40.420",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:51.630",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41370",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:30.057",
"lastModified": "2021-11-12T17:15:39.847",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:51.893",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-42283."
"value": "NTFS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41371",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:30.297",
"lastModified": "2021-11-10T21:19:57.057",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:52.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38631."
"value": "Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41372",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:30.517",
"lastModified": "2021-11-12T17:32:32.197",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:52.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Power BI Report Server Spoofing Vulnerability"
"value": "<p>A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power BI Report Server Template file (pbix) containing HTML files is uploaded to the server and HTML files are accessed directly by the victim.</p>\n<p>Combining these 2 vulnerabilities together, an attacker is able to upload malicious Power BI templates files to the server using the victim's session and run scripts in the security context of the user and perform privilege escalation in case the victim has admin privileges when the victim access one of the HTML files present in the malicious Power BI template uploaded.</p>\n<p>The security update addresses the vulnerability by helping to ensure that Power BI Report Server properly sanitize file uploads.</p>\n"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41373",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:30.793",
"lastModified": "2021-11-10T21:31:11.930",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:52.673",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41374",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:31.037",
"lastModified": "2021-11-10T20:05:45.710",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:52.897",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41375, CVE-2021-41376."
"value": "Azure Sphere Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41375",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:31.260",
"lastModified": "2021-11-10T21:16:17.433",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:53.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41374, CVE-2021-41376."
"value": "Azure Sphere Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-41376",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:31.483",
"lastModified": "2021-11-10T21:17:00.110",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:53.353",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41374, CVE-2021-41375."
"value": "Azure Sphere Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41377",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:31.707",
"lastModified": "2021-11-12T20:37:26.893",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:53.593",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41378",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:31.913",
"lastModified": "2021-11-12T20:33:55.097",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:53.907",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41379",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:32.127",
"lastModified": "2021-11-12T20:17:30.037",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:54.133",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-03-03",
"cisaActionDue": "2022-03-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -21,8 +21,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -74,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-59"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42274",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:43.317",
"lastModified": "2021-11-12T20:16:06.023",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:54.347",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42275",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:43.570",
"lastModified": "2021-11-12T20:07:09.077",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:54.560",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42276",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:43.800",
"lastModified": "2021-11-12T20:06:16.707",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:54.763",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42277",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:44.063",
"lastModified": "2021-11-12T19:42:03.327",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:54.970",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42278",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:44.300",
"lastModified": "2021-11-12T19:01:09.060",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:55.160",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-11",
"cisaActionDue": "2022-05-02",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -21,8 +21,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -74,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-20"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42279",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:44.560",
"lastModified": "2021-11-12T18:56:48.957",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:55.363",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42280",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:44.770",
"lastModified": "2021-11-12T18:36:39.673",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:55.567",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42282",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:44.987",
"lastModified": "2022-05-23T17:42:15.450",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:55.820",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42287, CVE-2021-42291."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42283",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:45.213",
"lastModified": "2022-05-23T17:42:15.497",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:56.020",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-41370."
"value": "NTFS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42284",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:45.437",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:56.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42285",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:45.673",
"lastModified": "2022-05-23T17:42:15.593",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:56.430",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42286",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:45.897",
"lastModified": "2022-05-23T17:42:15.650",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:56.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42287",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:46.137",
"lastModified": "2022-05-23T17:42:15.677",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:56.857",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-11",
"cisaActionDue": "2022-05-02",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -21,8 +21,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42288",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:46.373",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:57.040",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42291",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:46.653",
"lastModified": "2022-05-23T17:42:15.720",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:57.257",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42287."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42292",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:47.007",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:57.467",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-17",
"cisaActionDue": "2021-12-01",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -21,7 +21,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -39,6 +39,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "NVD-CWE-Other"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42296",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:47.223",
"lastModified": "2021-11-13T04:49:08.583",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:57.697",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42297",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-24T01:15:08.310",
"lastModified": "2021-11-29T18:31:39.613",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:57.887",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43211."
"value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42298",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:47.477",
"lastModified": "2021-11-17T19:34:27.747",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:58.090",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42300",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:47.720",
"lastModified": "2021-11-17T19:34:57.970",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:58.273",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42301",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:47.993",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:58.460",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42323."
"value": "Azure RTOS Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42302",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:48.260",
"lastModified": "2021-11-15T17:14:37.477",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:58.643",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42303, CVE-2021-42304."
"value": "Azure RTOS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42303",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:48.547",
"lastModified": "2021-11-15T17:25:30.963",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:58.823",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42304."
"value": "Azure RTOS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42304",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:48.843",
"lastModified": "2021-11-15T17:14:10.870",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:59.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42303."
"value": "Azure RTOS Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42305",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:49.143",
"lastModified": "2021-11-15T20:05:50.373",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:59.187",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-41349."
"value": "Microsoft Exchange Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42306",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-24T01:15:08.363",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:59.377",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Active Directory Information Disclosure Vulnerability"
"value": "<p>An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate <a href=\"https://docs.microsoft.com/en-us/graph/api/resources/keycredential?view=graph-rest-1.0\">keyCredential</a>\u202f on an Azure AD <a href=\"https://docs.microsoft.com/en-us/azure/active-directory/develop/app-objects-and-service-principals\">Application or Service Principal</a> (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.</p>\n<p>Azure AD\u202faddressed this vulnerability by preventing disclosure of any private key\u202fvalues added\u202fto the application.</p>\n<p>Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.</p>\n<p>For more details on this issue, please refer to the <a href=\"https://aka.ms/CVE-2021-42306-AAD\">MSRC Blog Entry</a>.</p>\n"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42308",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-24T01:15:08.410",
"lastModified": "2021-11-30T07:05:16.387",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:59.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42316",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:49.437",
"lastModified": "2021-11-15T19:46:27.680",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:59.763",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability"
"value": "Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42319",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:49.740",
"lastModified": "2021-11-15T21:49:07.790",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:15:59.943",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42321",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:50.047",
"lastModified": "2022-08-29T18:59:05.607",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:00.120",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-17",
"cisaActionDue": "2021-12-01",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -21,7 +21,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -39,6 +39,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42322",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:50.370",
"lastModified": "2021-11-15T21:49:45.687",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:00.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-42323",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:50.673",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:00.487",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42301."
"value": "Azure RTOS Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-43208",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:54.603",
"lastModified": "2021-11-15T19:39:22.027",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:00.720",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "3D Viewer Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-43209."
"value": "3D Viewer Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-43209",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:54.760",
"lastModified": "2021-11-17T02:32:20.230",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:00.907",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "3D Viewer Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-43208."
"value": "3D Viewer Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-43211",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-24T01:15:08.457",
"lastModified": "2021-11-30T07:06:45.307",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:01.083",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42297."
"value": "Windows 10 Update Assistant Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-43220",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-24T01:15:08.497",
"lastModified": "2021-11-30T07:07:19.743",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:01.253",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-43221",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-24T01:15:08.540",
"lastModified": "2021-11-30T16:35:01.560",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T16:16:01.433",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
],
"cvssMetricV2": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-45435",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-28T15:15:07.590",
"lastModified": "2022-02-02T18:41:12.427",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-22995",
"sourceIdentifier": "psirt@wdc.com",
"published": "2022-03-25T23:15:08.410",
"lastModified": "2023-11-07T03:44:01.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-28T15:19:51.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "cb3b742e-5145-4748-b44b-5ffd45bf3b6a",
"source": "psirt@wdc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -95,7 +95,7 @@
]
},
{
"source": "cb3b742e-5145-4748-b44b-5ffd45bf3b6a",
"source": "psirt@wdc.com",
"type": "Secondary",
"description": [
{
@ -413,24 +413,68 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.1.18",
"matchCriteriaId": "9B3B3806-09AC-4151-9138-19276A22C961"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/55ROUJI22SHZX5EM23QAILZHI67EZQKW/",
"source": "psirt@wdc.com"
"source": "psirt@wdc.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5CZZLFOTUP3QYHGHSDUNENGSLPJ6KGO/",
"source": "psirt@wdc.com"
"source": "psirt@wdc.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XO34FWOIJI6V6PH2XY52WNBBARVWPJG2/",
"source": "psirt@wdc.com"
"source": "psirt@wdc.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202311-02",
"source": "psirt@wdc.com"
"source": "psirt@wdc.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-23125",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-28T19:15:10.507",
"lastModified": "2023-11-01T17:15:10.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-28T15:12:08.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -57,6 +57,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -124,7 +134,11 @@
},
{
"url": "https://security.gentoo.org/glsa/202311-02",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5503",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24122",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-29T22:15:07.487",
"lastModified": "2023-11-09T14:44:33.733",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T16:04:30.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -357,11 +357,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSR3AI2IQGRKZCHNKF6S25JGDKUEAWWL/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVSZKUJAZ2VN6LJ35J2B6YD6BOPQTU3B/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20220221-0001/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24599",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-24T15:15:29.633",
"lastModified": "2023-11-22T03:15:07.263",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-28T15:58:19.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,6 +90,36 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
@ -104,19 +134,31 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4JXZ6QAMA3TSRY6GUZRY3WTHR7P5TPH/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTETOUJNRR75REYJZTBGF6TAJZYTMXUY/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZPG27YKICLIWUFOPVUOAFAZGOX4BNHY/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3546",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-17T12:15:11.217",
"lastModified": "2023-11-07T03:51:24.917",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3548",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-17T12:15:11.397",
"lastModified": "2023-11-07T03:51:25.283",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3549",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-17T12:15:11.473",
"lastModified": "2023-11-07T03:51:25.433",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3582",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-18T11:15:09.890",
"lastModified": "2023-11-07T03:51:28.023",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3585",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-18T11:15:10.117",
"lastModified": "2023-11-07T03:51:28.430",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -74,7 +74,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@ -93,8 +93,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3587",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-18T13:15:10.510",
"lastModified": "2023-11-07T03:51:28.613",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42232",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-14T17:15:16.843",
"lastModified": "2022-10-17T17:45:09.220",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42241",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-06T18:17:58.167",
"lastModified": "2022-10-06T19:13:00.580",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42242",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-06T18:18:23.363",
"lastModified": "2022-10-06T19:13:53.067",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42243",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-06T18:18:24.127",
"lastModified": "2022-10-06T19:17:29.520",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42249",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-06T18:18:24.427",
"lastModified": "2022-10-06T19:20:21.100",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-42250",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-06T18:18:24.697",
"lastModified": "2022-10-06T19:22:51.160",
"lastModified": "2023-12-28T16:46:19.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_cold_storage_management_system_project:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "927B57F8-82DF-41A0-9935-5F4DE91A86BB"
"criteria": "cpe:2.3:a:oretnom23:simple_cold_storage_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46B90B33-68A7-49D0-AC82-B19068310C9C"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4393",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-09T23:15:28.033",
"lastModified": "2023-11-13T14:11:26.470",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:41:02.893",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45188",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-12T05:15:12.907",
"lastModified": "2023-11-07T03:54:40.037",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-28T15:12:38.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -66,24 +66,82 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZYWSGVA6WXREMB6PV56HAHKU7R6KPOP/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GEAFLA5L2SHOUFBAGUXIF2TZLGBXGJKT/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SG6WZW5LXFVH3P7ZVZRGHUVJEMEFKQLI/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html",
@ -110,7 +168,11 @@
},
{
"url": "https://security.gentoo.org/glsa/202311-02",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://sourceforge.net/projects/netatalk/files/netatalk/",
@ -122,7 +184,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5503",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4907",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-07-29T00:15:10.860",
"lastModified": "2023-11-13T05:15:08.490",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T15:39:50.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -62,6 +62,41 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
@ -78,21 +113,29 @@
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5552",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2680",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-13T17:15:09.697",
"lastModified": "2023-11-16T16:15:30.260",
"vulnStatus": "Modified",
"lastModified": "2023-12-28T16:23:09.520",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -130,7 +130,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231116-0001/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27447",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-28T11:15:07.973",
"lastModified": "2023-12-28T11:15:07.973",
"vulnStatus": "Received",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32513",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-28T11:15:08.590",
"lastModified": "2023-12-28T11:15:08.590",
"vulnStatus": "Received",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32795",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-28T11:15:08.833",
"lastModified": "2023-12-28T11:15:08.833",
"vulnStatus": "Received",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-34829",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-28T03:15:07.587",
"lastModified": "2023-12-28T03:15:07.587",
"vulnStatus": "Received",
"lastModified": "2023-12-28T15:09:53.403",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en TP-Link Tapo anterior a v3.1.315 permite a los atacantes acceder a las credenciales de usuario en texto plano."
}
],
"metrics": {},

Some files were not shown because too many files have changed in this diff Show More