Auto-Update: 2024-07-09T20:00:19.076178+00:00

This commit is contained in:
cad-safe-bot 2024-07-09 20:03:11 +00:00
parent e9c2086156
commit ed92089498
440 changed files with 5290 additions and 2246 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2010-4398",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-12-06T13:44:54.863",
"lastModified": "2018-10-12T21:59:03.130",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:24:01.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-21",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
@ -66,48 +89,48 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60EC86B8-5C8C-4873-B364-FB1F8EFE1CFF"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"matchCriteriaId": "CC916D5A-0644-4423-A52E-D4310906BE78"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "3A04E39A-623E-45CA-A5FC-25DAA0F275A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"matchCriteriaId": "95DC297F-06DB-4FB3-BFB6-7312C059E047"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
@ -117,67 +140,107 @@
"references": [
{
"url": "http://isc.sans.edu/diary.html?storyid=9988",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/42356",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://support.avaya.com/css/P8/documents/100127248",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://twitter.com/msftsecresponse/statuses/7590788200402945",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.exploit-db.com/exploits/15609/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/529673",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/45045",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1025046",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2011/0324",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12162",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2011-2005",
"sourceIdentifier": "secure@microsoft.com",
"published": "2011-10-12T02:52:43.910",
"lastModified": "2019-02-26T14:04:00.993",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:23:38.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "NVD-CWE-noinfo"
}
]
}
@ -66,23 +89,18 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
@ -92,11 +110,18 @@
"references": [
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-080",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13114",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2012-0518",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2012-10-16T23:55:03.087",
"lastModified": "2016-11-28T19:07:49.820",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:26:11.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-601"
}
]
}
@ -77,7 +100,10 @@
"references": [
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",

View File

@ -2,8 +2,9 @@
"id": "CVE-2012-2539",
"sourceIdentifier": "secure@microsoft.com",
"published": "2012-12-12T00:55:01.060",
"lastModified": "2018-10-12T22:03:08.390",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:23:09.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-399"
"value": "CWE-787"
}
]
}
@ -66,13 +89,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "AED6C159-CD2C-436B-99BC-00E79A685D44"
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "55AA5CC4-AF80-49A2-ACD1-5644AA971044"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"matchCriteriaId": "44BC7B7B-7191-431C-8CAE-83B3F0EFF03E"
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "71AF058A-2E5D-4B11-88DB-8903C64B13C1"
},
{
"vulnerable": true,
@ -81,8 +104,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E647A7B3-7A92-4584-BDA7-81752FF59411"
"criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBCB0A0-BC40-4E6B-BD06-A137BB964B7F"
},
{
"vulnerable": true,
@ -114,16 +142,24 @@
"url": "http://www.us-cert.gov/cas/techalerts/TA12-346A.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-079",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16073",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2013-1690",
"sourceIdentifier": "security@mozilla.org",
"published": "2013-06-26T03:19:10.793",
"lastModified": "2017-09-19T01:36:10.950",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:25:57.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -67,124 +90,28 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndIncluding": "21.0",
"matchCriteriaId": "29071754-CC8F-42D9-82D4-140236802506"
"versionEndExcluding": "22.0",
"matchCriteriaId": "B0321165-FB26-4E37-B9EC-E09FF46034B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06FF9DFE-491D-4260-8A49-07FD342B9412"
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.0.7",
"matchCriteriaId": "C598E3DF-1B51-4FFC-8B05-D9BEF244AACA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DE09D089-7F48-466B-B03A-C64152A12615"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "653D73DA-21C0-4C3F-9269-5A6D5C5B1E34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "804A0ACE-EB28-413D-93F4-E849FEA01390"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA49C6F-9115-41A5-BBDE-743CB9DEDDA8"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BBC7F8-D102-403F-8A88-AF279536E2F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDAC701-5E69-4633-8CE4-04B8AFCC10C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83D5CFC4-C5DD-4747-985A-BC7A8E7C6EF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5AFA78C-71F3-4E64-8A8F-5BA028F04037"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F99963C6-175B-4099-86F4-BADCA43DB41F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96530DB0-8A9E-48FD-A5C5-28FD467568B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox_esr:17.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9B0AC5E6-F4E3-41A9-A611-A0FAF11ABF68"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.0.6",
"matchCriteriaId": "5C8122DC-6877-4EC8-8041-B579FC5AC6CA"
"versionEndExcluding": "17.0.7",
"matchCriteriaId": "945D0C7E-E76B-4E80-A78E-8FC59E0579E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FD78A8-0D3A-412C-8776-20C598697564"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "777D8DC5-8D43-4842-B0A7-3C933F41F6E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "808C66D2-4C53-4544-AD21-443D9A400B84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB95E8B-CF01-471F-8306-BB9FB0896904"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7E092E-BCBE-48B4-8F6A-D3E4A0369AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1D90B0-9E81-4828-8122-A66FB0953863"
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.0.7",
"matchCriteriaId": "D30B82F9-F16D-48C8-BFC4-1F4FA628B9E2"
}
]
}
@ -198,38 +125,183 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "341D94CE-C0EB-47FA-A043-E7B0F4344BBB"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84C3EE07-F201-451A-89A1-A41B8B2165E6"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "45837B42-7D29-4475-94F1-E29CD5831C7F"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "59D47E43-886E-4114-96A2-DBE719EA3A89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7028A433-7D1B-4C6F-A0F6-1B69682F7853"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "86C07513-8F98-4FA6-837D-7D735AE5EA91"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D87C70-0EC2-49DE-A59D-CAF22760BC9D"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird_esr:17.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "61AE2EAA-55A4-4FC9-BC3F-0FEE5BB2DE99"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
"matchCriteriaId": "D1D7B467-58DD-45F1-9F1F-632620DF072A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*",
"matchCriteriaId": "7F4AF9EC-7C74-40C3-A1BA-82B80C4A7EE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:vmware:*:*",
"matchCriteriaId": "DB9BBC2E-7D91-4879-898A-520D2D758D1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
"matchCriteriaId": "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
"matchCriteriaId": "DB4D6749-81A1-41D7-BF4F-1C45A7F49A22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*",
"matchCriteriaId": "436EF2ED-FDBB-4B64-8EC4-33C3E4253F06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026"
}
]
}
@ -239,43 +311,81 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0981.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0982.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2013/dsa-2716",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2013/dsa-2720",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.mozilla.org/security/announce/2013/mfsa2013-53.html",
@ -286,27 +396,47 @@
},
{
"url": "http://www.securityfocus.com/bid/60778",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-1890-1",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-1891-1",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=857883",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=901365",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16996",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2013-2551",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-03-11T10:55:01.070",
"lastModified": "2018-10-12T22:04:23.617",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:22:54.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorComment": "CWE 416 User-after-free \n\nhttp://cwe.mitre.org/data/definitions/416.html",
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
@ -20,6 +21,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -60,6 +83,7 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -69,28 +93,222 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
}
@ -100,6 +318,7 @@
"url": "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -114,7 +333,7 @@
"url": "http://twitter.com/thezdi/statuses/309452625173176320",
"source": "cve@mitre.org",
"tags": [
"Press/Media Coverage"
"Not Applicable"
]
},
{
@ -127,11 +346,18 @@
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-037",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16317",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2013-2729",
"sourceIdentifier": "psirt@adobe.com",
"published": "2013-05-16T11:45:31.263",
"lastModified": "2017-09-19T01:36:25.733",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:22:32.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-190"
}
]
}
@ -66,123 +89,45 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086"
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.5.5",
"matchCriteriaId": "413B5753-2B8D-44F6-B3A3-3CB4C9E8B68E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE"
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.1.7",
"matchCriteriaId": "46FE52E1-6878-41E8-9898-B0C93DB1A711"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96"
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.0.03",
"matchCriteriaId": "64498BAE-6B93-4171-987C-DA0D7E5586B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E"
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.5.5",
"matchCriteriaId": "59FB20F5-387E-4DB3-A2D5-E027C678B771"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89"
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.1.7",
"matchCriteriaId": "085F0347-0232-481A-8275-E19A9A0631AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6F49FE-2332-4CAF-A11D-CDE46A71447F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0D8BBD-F727-4957-8128-10A4C456FBD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C107680A-DC95-454D-9315-9223A803A0EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "196213BA-0A50-4D0C-A959-EF9F8EB92095"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "53433777-A33B-4265-96EE-36DC935ACB00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DDDCC9-EC55-42D4-8116-4D60BC3E8749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FCDF625D-358F-4359-897A-0188CCD20AD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5083821C-7D10-43E9-ACAC-19C43F7B6D26"
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0",
"versionEndExcluding": "11.0.03",
"matchCriteriaId": "847908BF-1CD9-485F-93D7-5EB600DD7220"
}
]
}
@ -196,58 +141,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C"
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "366E85EF-ED5F-4D4D-9CBE-E69F7248CB2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56C05D36-1343-4571-9886-E1AE8952E096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5FBE0589-567D-4440-A51F-4EEC0A29DD44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "823940EF-8B5F-44B0-8C74-2290A39DD15B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B6944168-B6E8-4267-AE42-6E926B9CCB56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "35D7E162-657C-4E1A-B394-80E457B3E366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F7EC9A-2CD6-4C75-8D2C-F48F1ACCEFF0"
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
}
]
}
@ -261,323 +161,38 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3597B29D-1871-460A-A128-86C6BB777F36"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E72C3C61-511E-4977-B029-70277C68E24D"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "47478166-EE66-4837-A6C0-0A519F9EDD26"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*",
"matchCriteriaId": "E5A5A316-88A0-4C32-A05A-1EDC74831731"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*",
"matchCriteriaId": "BCF823BA-69E2-4BFA-A779-5652B98B8403"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "D6928580-8A0C-40C8-9FCA-452BFAC86390"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*",
"matchCriteriaId": "27511A34-2631-4461-A361-F1073820BE08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*",
"matchCriteriaId": "FA6471B0-C717-4ED5-9726-AE01FE5FEBE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*",
"matchCriteriaId": "54510A26-9F44-413B-AA65-828438192AB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*",
"matchCriteriaId": "1998E572-FB0D-4F37-98FD-5D5B50D04FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*",
"matchCriteriaId": "FC6758E8-474A-4D64-AB29-DF484F3EE6AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9F28D056-FBD4-4220-8326-BA4D6FFB193C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*",
"matchCriteriaId": "361B2A72-9C21-4D71-A04D-5C68E1B947E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*",
"matchCriteriaId": "3563311C-2685-4A43-9D3D-A747A9851676"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*",
"matchCriteriaId": "C2A630C3-6CC0-409E-B77C-D0AA2DBD482B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*",
"matchCriteriaId": "51589BA6-E573-45FE-B778-D778AD049F59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "958768B5-ABA3-4843-986D-499AD480832B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*",
"matchCriteriaId": "31278B7A-954C-4C44-8422-197C8E8C2F0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0335CEAA-ED55-46AA-98D9-693733CDA68C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "39E332C3-6ABF-4BFE-9C27-7D581BD286AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "314014C8-527A-4D6D-B9BF-30084178C9B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D12CA81D-6CDD-4FB4-8DE2-004D783BADE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF167B4-0D05-490A-9A11-0447D8AA441B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E0673141-9FA2-4C20-A224-0F46F8CB2F9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BD194E0C-6699-4927-AC72-4D3339AF2AE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB429B0-E3E1-41F1-9B75-C0A60E38F23F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
"matchCriteriaId": "353F77A1-E19C-4126-A10C-5A86B5C36E56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
"matchCriteriaId": "D57B9AEA-000B-49BF-BDBF-1CC7642F837A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3CA4B45-E643-4705-9B6C-8598A5357326"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ADD314C8-A849-46C6-9ADD-72A2DF4C3219"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9EFDECFD-E02F-4545-939B-8C18A0BD82A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D1565F5-8627-445B-AC76-662C08F215D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B10B4387-A6DB-4563-843E-0CF50F6293E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D917DF13-8582-455E-A8E6-3334F36553A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "04E4C131-8681-4A7E-B4E1-A9E44FBFB29D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "10D5B006-F8CD-4B51-A5B6-A282C95C6C19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "51C67ABD-5800-46DD-9E81-2A586698BC90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FF4675-A9FF-4B0F-BBC6-D29B6324D27D"
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
]
}
@ -587,27 +202,41 @@
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2013-0826.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-201308-03.xml",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html",
"source": "psirt@adobe.com",
"tags": [
"Not Applicable",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16717",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2013-3660",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-05-24T20:55:01.903",
"lastModified": "2019-02-26T14:04:02.353",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:25:48.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -66,28 +89,33 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"matchCriteriaId": "976EFC05-9B37-4661-AD34-4FFDB5AB48E0"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"matchCriteriaId": "9DAA2E6F-A666-4136-8F6B-E35C313CAB2B"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
@ -96,18 +124,18 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"matchCriteriaId": "C6109348-BC79-4ED3-8D41-EA546A540C79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
}
]
}
@ -117,20 +145,30 @@
"references": [
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/53435",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -143,45 +181,71 @@
},
{
"url": "http://twitter.com/taviso/statuses/335557286657400832",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "http://www.computerworld.com/s/article/9239477",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.exploit-db.com/exploits/25611/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.osvdb.org/93539",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Press/Media Coverage"
]
},
{
"url": "http://www.us-cert.gov/ncas/alerts/TA13-190A",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-1770",
"sourceIdentifier": "secure@microsoft.com",
"published": "2015-06-10T01:59:36.483",
"lastModified": "2018-10-12T22:09:12.167",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:27:09.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-19"
"value": "CWE-824"
}
]
}
@ -66,13 +89,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_2013:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "7E3DBA2E-2F97-4FFA-B018-AC2D36067783"
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*",
"matchCriteriaId": "552E1557-D6FA-45DD-9B52-E13ACDBB8A62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_2013:rt:sp1:*:*:*:*:*:*",
"matchCriteriaId": "E0447635-86B1-4CA0-80A3-BC21F68C7E48"
"criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"matchCriteriaId": "F7DDFFB8-2337-4DD7-8120-56CC8EF134B4"
}
]
}
@ -82,15 +105,29 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/75016",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1032523",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-059",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2015-2419",
"sourceIdentifier": "secure@microsoft.com",
"published": "2015-07-14T21:59:33.283",
"lastModified": "2018-10-12T22:09:26.497",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:24:22.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,6 +20,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,13 +75,14 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -68,13 +92,86 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
}
]
}
]
}
@ -82,11 +179,20 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1032894",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-0040",
"sourceIdentifier": "secure@microsoft.com",
"published": "2016-02-10T11:59:06.440",
"lastModified": "2018-10-12T22:10:50.127",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:21:38.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,17 +20,17 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
@ -73,7 +74,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "NVD-CWE-noinfo"
}
]
}
@ -87,13 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"matchCriteriaId": "F282E5E8-A5C9-4092-B0BF-07A5A2CAA6F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"matchCriteriaId": "D16A8D29-57BF-4B74-85F2-24DBD8B52BBF"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
@ -118,15 +114,29 @@
"references": [
{
"url": "http://www.securitytracker.com/id/1034985",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/44586/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-0151",
"sourceIdentifier": "secure@microsoft.com",
"published": "2016-04-12T23:59:15.890",
"lastModified": "2018-10-12T22:11:19.723",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:25:19.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,17 +20,17 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
@ -74,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "NVD-CWE-noinfo"
}
]
}
@ -88,18 +89,18 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F"
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": true,
@ -126,16 +127,27 @@
"url": "http://www.securitytracker.com/id/1035544",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-048",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/39740/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-0189",
"sourceIdentifier": "secure@microsoft.com",
"published": "2016-05-11T01:59:30.537",
"lastModified": "2018-10-12T22:11:30.600",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:25:02.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -74,7 +75,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
@ -83,27 +84,6 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"matchCriteriaId": "15BAAA8C-7AF1-46CE-9FFB-3A498508A1BF"
}
]
},
{
"operator": "OR",
"negate": false,
@ -124,6 +104,165 @@
"matchCriteriaId": "1C94EA55-F0DE-4A45-A020-9F7FE2A3745B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0061E11D-9293-401A-BA38-85AD0C4A04E3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
}
]
}
]
}
@ -131,27 +270,53 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/90012",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1035820",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-053",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/40118/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7200",
"sourceIdentifier": "secure@microsoft.com",
"published": "2016-11-10T06:59:15.733",
"lastModified": "2018-10-12T22:14:09.140",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:21:29.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,25 +20,25 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -74,13 +75,14 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -88,8 +90,34 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD5B232-95EA-4F8E-8C7D-7976877AD243"
"criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:*:*:x64:*",
"matchCriteriaId": "3E6083A1-78C4-4ED9-A80A-41483D47ADC0"
}
]
}
@ -99,31 +127,61 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/93968",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1037245",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-129",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/theori-io/chakra-2016-11",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/40785/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/40990/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2016-7201",
"sourceIdentifier": "secure@microsoft.com",
"published": "2016-11-10T06:59:16.810",
"lastModified": "2018-10-12T22:14:09.703",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:21:10.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,25 +20,25 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -74,13 +75,14 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-843"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -88,8 +90,34 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD5B232-95EA-4F8E-8C7D-7976877AD243"
"criteria": "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D197D7-57FB-4898-8C70-B19D5F0D5BE0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
}
]
}
@ -99,31 +127,62 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/140382/Microsoft-Edge-chakra.dll-Information-Leak-Type-Confusion.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/94038",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1037245",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-129",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/theori-io/chakra-2016-11",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/40784/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/40990/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2017-0148",
"sourceIdentifier": "secure@microsoft.com",
"published": "2017-03-17T00:59:04.150",
"lastModified": "2018-06-21T01:29:00.730",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:28:14.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,13 +20,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -100,18 +101,18 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
@ -120,8 +121,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F"
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": false,
@ -140,8 +141,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*",
"matchCriteriaId": "AB506484-7F0C-46BF-8EA6-4FB5AF454CED"
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": false,
@ -161,51 +162,347 @@
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0814F7B8-8022-4DCC-BE37-4868EB912881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.03:*:*:*:*:*:*:*",
"matchCriteriaId": "87A45473-9558-4165-949B-D63F1486F28E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.20:*:*:*:*:*:*:*",
"matchCriteriaId": "59E3D131-8FDF-424C-9BBA-41FDAE43F24C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_p300_firmware:13.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2C270FA0-6961-4181-8388-E609DAEADC09"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:acuson_p300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C07C8A47-9E8F-42E4-BB35-64590853A9C5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_p500_firmware:va10:*:*:*:*:*:*:*",
"matchCriteriaId": "506F5373-3C3C-4F47-8FC0-D5F04095B324"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_p500_firmware:vb10:*:*:*:*:*:*:*",
"matchCriteriaId": "42DBCB0C-2C71-4427-ADF8-FCB4920609B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:acuson_p500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C50335A-8742-4E2B-B22D-0ED0A0DFB5C4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_sc2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndExcluding": "4.0e",
"matchCriteriaId": "D4CFBFA2-BDE4-4566-A435-92BFB87C48E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_sc2000_firmware:5.0a:*:*:*:*:*:*:*",
"matchCriteriaId": "7DFBC156-20D1-4546-948F-A2118D602137"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:acuson_sc2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70575FD4-0A0A-4D11-9069-F808D9F00D10"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_x700_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1E644CD-EA9B-45B5-A7C6-5F294D8A6909"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:acuson_x700_firmware:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F38DAB6-39E2-4048-A57D-C3EB8415F3F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:acuson_x700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05BD2983-B780-46F0-A857-CFC614D1B524"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:syngo_sc2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "4.0e",
"matchCriteriaId": "31FE05B1-0B85-424F-9F30-14BFCB2ED15D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:syngo_sc2000_firmware:5.0a:*:*:*:*:*:*:*",
"matchCriteriaId": "1753DB4B-1F5A-4193-A50C-C2A576F0884C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:syngo_sc2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25CEAC4F-CBA5-41BA-B389-4D0DA3F85B59"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:tissue_preparation_system_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DE83393-E735-42BC-86E9-5DAF9F403C73"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:tissue_preparation_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5641B967-9938-4148-90C4-D92C3E757847"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:versant_kpcr_molecular_system_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "582D4D5C-D0F1-403D-8687-3F1491943A65"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:versant_kpcr_molecular_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68FE5E09-78BB-4A22-9CAA-93ECD7AC33A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:versant_kpcr_sample_prep_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7B7CC4-E89E-4357-A7D6-AF74480F46B5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:versant_kpcr_sample_prep:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41EF3913-CD35-49FD-90D8-62228DB1390C"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/154690/DOUBLEPULSAR-Payload-Execution-Neutralization.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/156196/SMB-DOUBLEPULSAR-Remote-Code-Execution.html",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/96706",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1037991",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-701903.pdf",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-966341.pdf",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0148",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/41891/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/41987/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2017-0213",
"sourceIdentifier": "secure@microsoft.com",
"published": "2017-05-12T14:29:01.393",
"lastModified": "2019-10-03T00:03:26.223",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:24:42.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -19,26 +20,26 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -88,48 +89,48 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "7519928D-0FF2-4584-8058-4C7764CD5671"
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F"
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "197E82CB-81AF-40F1-A55C-7B596891A783"
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
@ -143,8 +144,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF6437F9-6631-49D3-A6C2-62329E278E31"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
}
]
}
@ -156,13 +157,19 @@
"url": "http://www.securityfocus.com/bid/98102",
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1038457",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0213",
@ -174,7 +181,12 @@
},
{
"url": "https://www.exploit-db.com/exploits/42020/",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-21551",
"sourceIdentifier": "security_alert@emc.com",
"published": "2021-05-04T16:15:07.867",
"lastModified": "2023-10-05T06:15:09.290",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:27:32.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-31",
"cisaActionDue": "2022-04-21",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -89,22 +90,22 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-782"
"value": "NVD-CWE-Other"
}
]
},
{
"source": "nvd@nist.gov",
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-782"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-31166",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-05-11T19:15:09.300",
"lastModified": "2023-08-02T00:15:11.973",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:28:03.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -108,23 +109,27 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.982",
"matchCriteriaId": "F170C517-0312-457D-9108-ECA6638C8223"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.982",
"matchCriteriaId": "957F366C-FD59-479A-A6C5-F93E35436549"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.982",
"matchCriteriaId": "BD0A39ED-F4B4-4C2D-BDB4-088426F2377B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.982",
"matchCriteriaId": "F42A77A0-2B44-4C08-8BBB-851B22AED6E8"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-3156",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T21:15:12.987",
"lastModified": "2024-02-04T09:15:08.010",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:27:53.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -160,6 +161,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
@ -170,6 +181,16 @@
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4D418D-B526-46B9-B439-E1963BF88C0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
@ -232,9 +253,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A88A76-CF8A-4D29-B480-E5317219072D"
"vulnerable": true,
"criteria": "cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53EF087B-D7E9-4F9A-803A-B0260C495C67"
}
]
},
@ -243,9 +264,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53EF087B-D7E9-4F9A-803A-B0260C495C67"
"vulnerable": false,
"criteria": "cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A88A76-CF8A-4D29-B480-E5317219072D"
}
]
}
@ -259,9 +280,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130"
"vulnerable": true,
"criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C"
}
]
},
@ -270,9 +291,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C"
"vulnerable": false,
"criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130"
}
]
}
@ -308,9 +329,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_compact_workstation_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA4F0AD-B8A4-4EB9-A220-FEEC9B147D3C"
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE3FF32-E472-4E90-9DE5-803AD6FD9E27"
}
]
},
@ -319,9 +340,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE3FF32-E472-4E90-9DE5-803AD6FD9E27"
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_compact_workstation_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA4F0AD-B8A4-4EB9-A220-FEEC9B147D3C"
}
]
}
@ -330,17 +351,6 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_es400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BBD07A-4731-41D1-AB66-77082951D99C"
}
]
},
{
"operator": "OR",
"negate": false,
@ -353,23 +363,23 @@
"matchCriteriaId": "9AA5297B-05DF-4A23-B684-60F2107339B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_kitchen_display_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1424AF8-9337-427B-B6FA-C5EB8B201FB7"
"criteria": "cpe:2.3:h:oracle:micros_es400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BBD07A-4731-41D1-AB66-77082951D99C"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -380,6 +390,17 @@
"matchCriteriaId": "57E6A365-F04F-4991-888F-D8E9391A9857"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_kitchen_display_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1424AF8-9337-427B-B6FA-C5EB8B201FB7"
}
]
}
]
},
@ -391,9 +412,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_workstation_5a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F607BA3F-246F-42BE-9EBD-A2CAE098C0C2"
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*",
"matchCriteriaId": "C78FDD3A-F241-4172-8725-7D51D8E705E7"
}
]
},
@ -402,9 +423,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*",
"matchCriteriaId": "C78FDD3A-F241-4172-8725-7D51D8E705E7"
"vulnerable": false,
"criteria": "cpe:2.3:h:oracle:micros_workstation_5a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F607BA3F-246F-42BE-9EBD-A2CAE098C0C2"
}
]
}
@ -476,6 +497,7 @@
"url": "http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
@ -509,7 +531,12 @@
},
{
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Feb/42",
@ -530,7 +557,12 @@
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2021/01/26/3",
@ -577,16 +609,24 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/30/6",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/30/8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10348",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -600,11 +640,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202101-33",
@ -645,7 +693,6 @@
"url": "https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
@ -701,8 +748,7 @@
"url": "https://www.sudo.ws/stable.html#1.9.5p2",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
"Release Notes"
]
},
{

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-34484",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-08-12T18:15:09.117",
"lastModified": "2023-12-28T20:15:48.487",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:27:20.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-03-31",
"cisaActionDue": "2022-04-21",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -94,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}
@ -108,38 +109,45 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19022",
"matchCriteriaId": "591E8C5B-1BA2-4542-B477-2742456AE766"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4583",
"matchCriteriaId": "13B252F6-CA16-41C8-804D-DF6863493170"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2114",
"matchCriteriaId": "F8D40D82-1D88-4CF1-B961-F9F28426C56B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.18363.1734",
"matchCriteriaId": "3DD2BDE6-67C6-48E2-BED0-12E4CC7EE6BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.1165",
"matchCriteriaId": "70336A6A-DE45-4604-BE81-10DA4DF12D3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1165",
"matchCriteriaId": "7AB7321A-1F89-48B3-8E5A-94791AB2BC86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19043.1165",
"matchCriteriaId": "2A860F2B-0533-46F7-879E-B932E4E44F0D"
},
{
"vulnerable": true,
@ -156,6 +164,12 @@
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.1165",
"matchCriteriaId": "C90BEC5F-E0A8-43C5-BB0D-251D19BFD66B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
@ -178,23 +192,21 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4583",
"matchCriteriaId": "11769DC8-BD9F-4526-8B53-5380327930FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2114",
"matchCriteriaId": "61219C24-A1AE-427F-BBF8-A984BCB1CA6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.1165",
"matchCriteriaId": "45A85E4C-6C7A-4B72-832D-AC12A78565C3"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-42287",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-11-10T01:19:46.137",
"lastModified": "2023-12-28T16:15:56.857",
"vulnStatus": "Modified",
"lastModified": "2024-07-09T18:28:30.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2022-04-11",
"cisaActionDue": "2022-05-02",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -94,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}
@ -108,13 +109,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
@ -133,8 +129,9 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.4770",
"matchCriteriaId": "572BDEFC-D3E8-4FF0-B91E-D21F42D2B82D"
},
{
"vulnerable": true,
@ -143,13 +140,15 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.2300",
"matchCriteriaId": "74A5AF5D-C59C-4093-A4C0-3BE230E7637F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F0241B0-855A-489C-9AAE-68BC2556F24D"
"versionEndExcluding": "10.0.20348.350",
"matchCriteriaId": "B662E504-15E6-4D85-8463-BBE9435790CC"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45147",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-07-09T12:15:08.830",
"lastModified": "2024-07-09T12:15:08.830",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32735",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-07-09T12:15:09.347",
"lastModified": "2024-07-09T12:15:09.347",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32737",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-07-09T12:15:09.627",
"lastModified": "2024-07-09T12:15:09.627",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3285",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T10:15:02.380",
"lastModified": "2024-07-09T10:15:02.380",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-3286",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:12.207",
"lastModified": "2024-07-09T11:15:12.207",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in POST /secretaries allows a low privileged user to create a low privileged user (secretary) in the system. This results in unauthorized data manipulation."
},
{
"lang": "es",
"value": "Una vulnerabilidad BOLA en POST /secretarias permite a un usuario con pocos privilegios crear un usuario con pocos privilegios (secretaria) en el sistema. Esto da como resultado una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-3287",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:12.397",
"lastModified": "2024-07-09T11:15:12.397",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in POST /admins allows a low privileged user to create a high privileged user (admin) in the system. This results in privilege escalation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en POST /admins permite que un usuario con pocos privilegios cree un usuario con altos privilegios (administrador) en el sistema. Esto da como resultado una escalada de privilegios."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-3288",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:12.600",
"lastModified": "2024-07-09T11:15:12.600",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in POST /providers allows a low privileged user to create a privileged user (provider) in the system. This results in privilege escalation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en POST /providers permite a un usuario con pocos privilegios crear un usuario privilegiado (proveedor) en el sistema. Esto da como resultado una escalada de privilegios."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-3289",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:12.787",
"lastModified": "2024-07-09T11:15:12.787",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in POST /services allows a low privileged user to create a service for any user in the system (including admin). This results in unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en POST /services permite a un usuario con pocos privilegios crear un servicio para cualquier usuario del sistema (incluido el administrador). Esto da como resultado una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-3290",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:12.987",
"lastModified": "2024-07-09T11:15:12.987",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in POST /customers allows a low privileged user to create a low privileged user (customer) in the system. This results in unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en POST /customers permite a un usuario con pocos privilegios crear un usuario con pocos privilegios (cliente) en el sistema. Esto da como resultado una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38047",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:10.333",
"lastModified": "2024-07-09T11:15:10.333",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /categories/{categoryId} allows a low privileged user to fetch, modify or delete the category of any user (including admin). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": "Una vulnerabilidad BOLA en GET, PUT, DELETE /categories/{categoryId} permite a un usuario con pocos privilegios buscar, modificar o eliminar la categor\u00eda de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38048",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:10.600",
"lastModified": "2024-07-09T11:15:10.600",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /providers/{providerId} allows a low privileged user to fetch, modify or delete a privileged user (provider). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": "Una vulnerabilidad BOLA en GET, PUT, DELETE /providers/{providerId} permite a un usuario con pocos privilegios buscar, modificar o eliminar un usuario privilegiado (proveedor). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38049",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:10.820",
"lastModified": "2024-07-09T11:15:10.820",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /appointments/{appointmentId} allows a low privileged user to fetch, modify or delete an appointment of any user (including admin). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /appointments/{appointmentId} permite a un usuario con pocos privilegios buscar, modificar o eliminar una cita de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38050",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:11.017",
"lastModified": "2024-07-09T11:15:11.017",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /webhooks/{webhookId} allows a low privileged user to fetch, modify or delete a webhook of any user (including admin). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /webhooks/{webhookId} permite a un usuario con pocos privilegios recuperar, modificar o eliminar un webhook de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38051",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:11.217",
"lastModified": "2024-07-09T11:15:11.217",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /secretaries/{secretaryId} allows a low privileged user to fetch, modify or delete a low privileged user (secretary). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /secretaries/{secretaryId} permite a un usuario con pocos privilegios buscar, modificar o eliminar a un usuario con pocos privilegios (secretaria). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38052",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:11.413",
"lastModified": "2024-07-09T11:15:11.413",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /admins/{adminId} allows a low privileged user to fetch, modify or delete a high privileged user (admin). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": "Una vulnerabilidad BOLA en GET, PUT, DELETE /admins/{adminId} permite a un usuario con pocos privilegios buscar, modificar o eliminar a un usuario con muchos privilegios (admin). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38053",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:11.617",
"lastModified": "2024-07-09T11:15:11.617",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /settings/{settingName} allows a low privileged user to fetch, modify or delete the settings of any user (including admin). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /settings/{settingName} permite a un usuario con pocos privilegios recuperar, modificar o eliminar la configuraci\u00f3n de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38054",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:11.820",
"lastModified": "2024-07-09T11:15:11.820",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /customers/{customerId} allows a low privileged user to fetch, modify or delete a low privileged user (customer). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /customers/{customerId} permite a un usuario con pocos privilegios buscar, modificar o eliminar a un usuario con pocos privilegios (cliente). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2023-38055",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-09T11:15:12.013",
"lastModified": "2024-07-09T11:15:12.013",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A BOLA vulnerability in GET, PUT, DELETE /services/{serviceId} allows a low privileged user to fetch, modify or delete the services of any user (including admin). This results in unauthorized access and unauthorized data manipulation."
},
{
"lang": "es",
"value": " Una vulnerabilidad BOLA en GET, PUT, DELETE /services/{serviceId} permite a un usuario con pocos privilegios recuperar, modificar o eliminar los servicios de cualquier usuario (incluido el administrador). Esto da como resultado un acceso no autorizado y una manipulaci\u00f3n de datos no autorizada."
}
],
"metrics": {

View File

@ -2,8 +2,16 @@
"id": "CVE-2023-38817",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-11T19:15:10.180",
"lastModified": "2024-05-17T02:26:42.437",
"lastModified": "2024-07-09T18:15:08.577",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39328",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-09T14:15:03.400",
"lastModified": "2024-07-09T14:15:03.400",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40356",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-07-09T16:15:03.067",
"lastModified": "2024-07-09T16:15:03.067",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40702",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-07-09T16:15:03.220",
"lastModified": "2024-07-09T16:15:03.220",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-48194",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:08.790",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in Tenda AC8v4 .V16.03.34.09 due to sscanf and the last digit of s8 being overwritten with \\x0. After executing set_client_qos, control over the gp register can be obtained."
}
],
"metrics": {},
"references": [
{
"url": "http://tenda.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/zt20xx/CVE-2023-48194",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50178",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:03.390",
"lastModified": "2024-07-09T16:15:03.390",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50179",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:03.640",
"lastModified": "2024-07-09T16:15:03.640",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50181",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:03.853",
"lastModified": "2024-07-09T16:15:03.853",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2023-50805",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T19:15:10.590",
"lastModified": "2024-07-09T19:15:10.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2023-50805/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2023-50806",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T19:15:10.820",
"lastModified": "2024-07-09T19:15:10.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850 Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380 Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300 that allows out-of-bounds access to a heap buffer in the SIM Proactive Command."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2023-50806/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2023-50807",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T19:15:11.020",
"lastModified": "2024-07-09T19:15:11.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Wearable Processor and Modems with versions Exynos 9110, Exynos Modem 5123, Exynos Modem 5300 that allows an out-of-bounds write in the heap in 2G (no auth)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2023-50807/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52237",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-07-09T12:15:10.743",
"lastModified": "2024-07-09T12:15:10.743",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52238",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-07-09T12:15:11.030",
"lastModified": "2024-07-09T12:15:11.030",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52891",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-07-09T12:15:11.263",
"lastModified": "2024-07-09T12:15:11.263",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1305",
"sourceIdentifier": "security@openvpn.net",
"published": "2024-07-08T18:15:07.150",
"lastModified": "2024-07-09T16:22:15.950",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20701",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:10.737",
"lastModified": "2024-07-09T17:15:10.737",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21303",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.117",
"lastModified": "2024-07-09T17:15:11.117",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21308",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.337",
"lastModified": "2024-07-09T17:15:11.337",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21317",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.573",
"lastModified": "2024-07-09T17:15:11.573",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21331",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:11.800",
"lastModified": "2024-07-09T17:15:11.800",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21332",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.033",
"lastModified": "2024-07-09T17:15:12.033",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21333",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.260",
"lastModified": "2024-07-09T17:15:12.260",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21335",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.487",
"lastModified": "2024-07-09T17:15:12.487",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21373",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:12.857",
"lastModified": "2024-07-09T17:15:12.857",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21398",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.103",
"lastModified": "2024-07-09T17:15:13.103",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21414",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.327",
"lastModified": "2024-07-09T17:15:13.327",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21415",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.550",
"lastModified": "2024-07-09T17:15:13.550",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21425",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.770",
"lastModified": "2024-07-09T17:15:13.770",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21428",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:13.973",
"lastModified": "2024-07-09T17:15:13.973",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21449",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:14.177",
"lastModified": "2024-07-09T17:15:14.177",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21729",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:14.463",
"lastModified": "2024-07-09T17:15:14.463",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21730",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:14.580",
"lastModified": "2024-07-09T17:15:14.580",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21731",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:14.660",
"lastModified": "2024-07-09T17:15:14.660",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21759",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:04.357",
"lastModified": "2024-07-09T16:15:04.357",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2177",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-07-09T14:15:03.953",
"lastModified": "2024-07-09T14:15:03.953",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22020",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-07-09T02:15:09.973",
"lastModified": "2024-07-09T16:22:17.840",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-22062",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2024-07-09T07:15:03.157",
"lastModified": "2024-07-09T07:15:03.157",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a permissions and access control vulnerability in ZXCLOUD IRAI.An attacker can elevate non-administrator permissions to administrator permissions by modifying the configuration."
},
{
"lang": "es",
"value": " Existe una vulnerabilidad de permisos y control de acceso en ZXCLOUD IRAI. Un atacante puede elevar los permisos que no son de administrador a permisos de administrador modificando la configuraci\u00f3n."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22271",
"sourceIdentifier": "security@vmware.com",
"published": "2024-07-09T13:15:09.887",
"lastModified": "2024-07-09T13:15:09.887",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-23562",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-07-08T16:15:07.797",
"lastModified": "2024-07-09T16:22:18.987",
"lastModified": "2024-07-09T18:15:09.083",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability in HCL Domino could allow disclosure of sensitive configuration information. A remote unauthenticated attacker could exploit this vulnerability to obtain information to launch further attacks against the affected system."
"value": "This vulnerability is re-assessed.\u00a0 Vulnerability details will be updated."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23663",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:04.593",
"lastModified": "2024-07-09T16:15:04.593",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26015",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:04.810",
"lastModified": "2024-07-09T16:15:04.810",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26184",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:14.773",
"lastModified": "2024-07-09T17:15:14.773",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26278",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:14.970",
"lastModified": "2024-07-09T17:15:14.970",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26279",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T17:15:15.047",
"lastModified": "2024-07-09T17:15:15.047",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-27183",
"sourceIdentifier": "security@joomla.org",
"published": "2024-07-09T18:15:09.277",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "XSS vulnerability in DJ-HelpfulArticles component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/dj-helpfularticles/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-27360",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:09.370",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, and Exynos W930 where they do not properly check length of the data, which can lead to a Denial of Service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27360/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-27362",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:09.573",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27362/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27782",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.017",
"lastModified": "2024-07-09T16:15:05.017",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27783",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.240",
"lastModified": "2024-07-09T16:15:05.240",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27784",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.470",
"lastModified": "2024-07-09T16:15:05.470",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27785",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-07-09T16:15:05.687",
"lastModified": "2024-07-09T16:15:05.687",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-28067",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T18:15:09.790",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Samsung Exynos Modem 5300 allows a Man-in-the-Middle (MITM) attacker to downgrade the security mode of packets going to the victim, enabling the attacker to send messages to the victim in plaintext."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-28067/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28747",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-07-09T07:15:03.563",
"lastModified": "2024-07-09T07:15:03.563",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can use the hard-coded credentials to access the SmartSPS devices with high privileges.\n"
},
{
"lang": "es",
"value": " Un atacante remoto no autenticado puede utilizar las credenciales codificadas para acceder a los dispositivos SmartSPS con altos privilegios."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28748",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-07-09T07:15:03.827",
"lastModified": "2024-07-09T07:15:03.827",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote attacker with high privileges may use a reading file function to inject OS commands.\n"
},
{
"lang": "es",
"value": " Un atacante remoto con altos privilegios puede utilizar una funci\u00f3n de lectura de archivos para inyectar comandos del sistema operativo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28749",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-07-09T07:15:04.067",
"lastModified": "2024-07-09T07:15:04.067",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote attacker with high privileges may use a writing file function to inject OS commands.\n"
},
{
"lang": "es",
"value": "Un atacante remoto con altos privilegios puede utilizar una funci\u00f3n de escritura de archivos para inyectar comandos del sistema operativo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28750",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-07-09T07:15:04.323",
"lastModified": "2024-07-09T07:15:04.323",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote attacker with high privileges may use a deleting file function to inject OS commands.\n"
},
{
"lang": "es",
"value": " Un atacante remoto con altos privilegios puede utilizar una funci\u00f3n de eliminaci\u00f3n de archivos para inyectar comandos del sistema operativo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-28751",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-07-09T07:15:04.587",
"lastModified": "2024-07-09T07:15:04.587",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An high privileged remote attacker can enable telnet access that accepts hardcoded credentials.\u00a0\n"
},
{
"lang": "es",
"value": " Un atacante remoto con altos privilegios puede habilitar el acceso telnet que acepte credenciales codificadas."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28882",
"sourceIdentifier": "security@openvpn.net",
"published": "2024-07-08T22:15:02.410",
"lastModified": "2024-07-09T13:15:10.117",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:19:14.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28899",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:15.210",
"lastModified": "2024-07-09T17:15:15.210",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28928",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-09T17:15:15.447",
"lastModified": "2024-07-09T17:15:15.447",
"vulnStatus": "Received",
"lastModified": "2024-07-09T18:18:38.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

Some files were not shown because too many files have changed in this diff Show More