Auto-Update: 2023-12-29T19:00:25.266106+00:00

This commit is contained in:
cad-safe-bot 2023-12-29 19:00:29 +00:00
parent d277e40e0d
commit f2456da7a5
171 changed files with 4044 additions and 621 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-125107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-19T03:15:07.433",
"lastModified": "2023-12-19T13:42:12.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T17:01:15.660",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -75,22 +95,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:corveda:phpsandbox:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "66A45853-178A-40F8-A922-7A6EE3348FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Corveda/PHPSandbox/commit/48fde5ffa4d76014bad260a3cbab7ada3744a4cc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Corveda/PHPSandbox/releases/tag/v1.3.5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.248270",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.248270",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-1239",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2017-10-18T17:29:00.197",
"lastModified": "2023-11-07T02:24:19.710",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T18:05:05.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -84,8 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:uclouvain:openjpeg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF759A5-7791-420C-AFB2-531FC701FBA6"
"criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1.1",
"matchCriteriaId": "2063942E-E483-4E3C-89FB-1357F9F1189E"
}
]
}
@ -137,15 +138,24 @@
"references": [
{
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=430891",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit"
]
},
{
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=457493",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00025.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9422",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:09.467",
"lastModified": "2017-07-01T01:30:13.390",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9423",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:11.107",
"lastModified": "2017-07-01T01:30:13.627",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9424",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:12.997",
"lastModified": "2017-07-01T01:30:13.687",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9425",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:14.077",
"lastModified": "2017-07-01T01:30:13.737",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9426",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:15.327",
"lastModified": "2017-07-01T01:30:13.797",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9428",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:17.843",
"lastModified": "2017-07-01T01:30:13.847",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9429",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:19.373",
"lastModified": "2017-07-01T01:30:13.890",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9430",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:20.780",
"lastModified": "2017-07-01T01:30:13.953",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9431",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:22.343",
"lastModified": "2017-07-01T01:30:14.000",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9432",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:23.657",
"lastModified": "2017-07-01T01:30:14.047",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9433",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:24.797",
"lastModified": "2017-07-01T01:30:14.097",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9434",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:26.110",
"lastModified": "2017-07-01T01:30:14.157",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9435",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-01-20T15:59:00.613",
"lastModified": "2018-10-30T16:27:33.013",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -104,9 +104,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3\\+git20160718",
"matchCriteriaId": "5CA1580D-FAA5-4022-B748-A4F9578491AF"
"matchCriteriaId": "F59B7474-3DF8-4151-A9EA-FEA693FC8A32"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9436",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-01-20T15:59:00.677",
"lastModified": "2018-10-30T16:27:33.013",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -104,9 +104,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3\\+git20160718",
"matchCriteriaId": "5CA1580D-FAA5-4022-B748-A4F9578491AF"
"matchCriteriaId": "F59B7474-3DF8-4151-A9EA-FEA693FC8A32"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9437",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:27.517",
"lastModified": "2017-07-01T01:30:14.203",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9438",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:28.640",
"lastModified": "2017-07-01T01:30:14.250",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9439",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:29.860",
"lastModified": "2017-07-01T01:30:14.297",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9440",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:31.640",
"lastModified": "2017-07-01T01:30:14.347",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9441",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:33.157",
"lastModified": "2017-07-01T01:30:14.390",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9442",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:34.347",
"lastModified": "2017-07-01T01:30:14.437",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9443",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:35.453",
"lastModified": "2017-07-01T01:30:14.487",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-30",
"matchCriteriaId": "6B0931C0-2169-4D94-B5A8-7477EA42D870"
"matchCriteriaId": "D0F4C28A-807A-41FD-98B2-94041822220C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9622",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:36.580",
"lastModified": "2016-12-13T18:14:04.257",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9623",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:37.940",
"lastModified": "2016-12-13T18:13:24.907",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9624",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:39.063",
"lastModified": "2016-12-13T18:07:33.887",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9625",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:40.317",
"lastModified": "2016-12-13T18:07:16.883",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9626",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:41.893",
"lastModified": "2016-12-13T15:06:37.017",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9627",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:43.080",
"lastModified": "2016-12-13T18:06:34.657",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9628",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:44.177",
"lastModified": "2016-12-13T15:05:28.007",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9629",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:45.520",
"lastModified": "2016-12-13T15:04:34.730",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9630",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:46.973",
"lastModified": "2016-12-13T18:03:45.873",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9631",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:48.300",
"lastModified": "2016-12-13T15:03:01.853",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9632",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:49.347",
"lastModified": "2016-12-13T15:00:33.137",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-9633",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-12-12T02:59:50.613",
"lastModified": "2016-12-13T18:03:25.650",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3-32",
"matchCriteriaId": "C62D15E2-C335-48B9-9189-31387B0DCA0C"
"matchCriteriaId": "6DC404FB-B7D2-41DE-934B-E4BA3EF37B75"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-6196",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-25T03:29:00.447",
"lastModified": "2019-10-03T00:03:26.223",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3",
"matchCriteriaId": "E9ED2413-606A-403C-82FF-A2EB381867AF"
"matchCriteriaId": "5C52F32D-ABD2-4E19-A0D0-0B284B91D2BD"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-6197",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-25T03:29:00.603",
"lastModified": "2019-04-05T00:29:01.740",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3",
"matchCriteriaId": "E9ED2413-606A-403C-82FF-A2EB381867AF"
"matchCriteriaId": "5C52F32D-ABD2-4E19-A0D0-0B284B91D2BD"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-6198",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-25T03:29:00.697",
"lastModified": "2019-10-03T00:03:26.223",
"lastModified": "2023-12-29T18:38:04.570",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:w3m_project:w3m:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.3",
"matchCriteriaId": "E9ED2413-606A-403C-82FF-A2EB381867AF"
"matchCriteriaId": "5C52F32D-ABD2-4E19-A0D0-0B284B91D2BD"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-25157",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-19T03:15:07.693",
"lastModified": "2023-12-19T13:42:12.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T17:04:07.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -75,22 +95,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ethex:ethex_contracts:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2019.06.26",
"matchCriteriaId": "2839EA05-27C3-44A1-95C7-14A1F20941A9"
}
]
}
]
}
],
"references": [
{
"url": "https://bitcointalk.org/index.php?topic=5120151.msg50827730#msg50827730",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/ethex-bet/ethex-contracts/commit/6b8664b698d3d953e16c284fadc6caeb9e58e3db",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.248271",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.248271",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-14297",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-07-24T16:15:11.803",
"lastModified": "2023-02-12T23:39:34.430",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T17:55:26.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -117,6 +117,13 @@
"criteria": "cpe:2.3:a:redhat:amq:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D3AF88-5812-4BB6-871F-C0EA39AD66AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:jboss-ejb-client:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "4.0.34",
"matchCriteriaId": "09D26C4C-4795-4D49-BA57-7242324B8E2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform_continuous_delivery:-:*:*:*:*:*:*:*",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2020-17163",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-12-29T17:15:49.710",
"lastModified": "2023-12-29T17:15:49.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Code Python Extension Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17163",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1636",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.167",
"lastModified": "2021-01-14T19:05:02.460",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:49.923",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1639",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.053",
"lastModified": "2021-03-03T19:23:33.477",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:50.150",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1641",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.337",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:50.357",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1717."
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1643",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.477",
"lastModified": "2021-01-14T19:28:12.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:50.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1644."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1644",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.540",
"lastModified": "2021-01-14T01:18:13.653",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:50.730",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1643."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1647",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.727",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:50.933",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -21,7 +21,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -39,6 +39,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "CWE-131"
"value": "CWE-20"
}
]
}
@ -198,7 +218,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1677",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.463",
"lastModified": "2021-01-20T20:04:26.890",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:51.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1705",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.103",
"lastModified": "2021-01-20T20:25:23.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:51.413",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1707",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.230",
"lastModified": "2021-01-19T20:48:30.107",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:51.617",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1711",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.463",
"lastModified": "2021-01-19T20:37:27.343",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:51.820",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1712",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.527",
"lastModified": "2021-01-15T18:04:54.690",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:52.010",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1719."
"value": "Microsoft SharePoint Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1713",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.573",
"lastModified": "2021-03-04T15:12:51.717",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:52.213",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1714."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1714",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.637",
"lastModified": "2021-01-14T19:32:44.003",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:52.413",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1713."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -104,7 +124,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1715",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.697",
"lastModified": "2021-03-04T14:51:33.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:52.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Word Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1716."
"value": "Microsoft Word Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1716",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.743",
"lastModified": "2021-01-14T19:35:43.757",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:52.820",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Word Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1715."
"value": "Microsoft Word Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1717",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.807",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:53.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1641."
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1718",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.870",
"lastModified": "2021-01-19T17:55:55.600",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:53.217",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1719",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.933",
"lastModified": "2021-01-19T14:52:29.803",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:53.407",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1712."
"value": "Microsoft SharePoint Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1721",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.210",
"lastModified": "2021-08-16T13:06:41.460",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:53.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1723",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.993",
"lastModified": "2021-07-08T13:16:14.537",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:53.777",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1724",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.493",
"lastModified": "2021-03-03T18:40:04.123",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:53.973",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1725",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:35.040",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:54.167",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1726",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.553",
"lastModified": "2021-03-03T18:37:11.730",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:54.357",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Spoofing Vulnerability"
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1728",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.710",
"lastModified": "2021-03-03T18:30:22.737",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:54.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-1730",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.790",
"lastModified": "2021-03-03T18:24:49.623",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:54.757",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-24085."
"value": "<p>A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.</p>\n<p>This update addresses this vulnerability.</p>\n<p>To prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.</p>\n"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1733",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:13.993",
"lastModified": "2021-03-03T16:36:29.080",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:54.940",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24066",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.117",
"lastModified": "2021-03-03T16:02:16.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:55.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24067",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.180",
"lastModified": "2021-03-03T15:52:05.700",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:55.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24068, CVE-2021-24069, CVE-2021-24070."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24068",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.243",
"lastModified": "2021-03-03T14:49:18.957",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:55.503",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24069, CVE-2021-24070."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24069",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.290",
"lastModified": "2021-03-03T14:46:13.453",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:55.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24070."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24070",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.350",
"lastModified": "2021-03-03T14:44:32.717",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:55.897",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24069."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24071",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.413",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:56.090",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24072",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.477",
"lastModified": "2021-03-03T14:31:27.320",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:56.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24073",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:14.540",
"lastModified": "2021-03-02T22:13:57.137",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:56.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24085",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:15.243",
"lastModified": "2021-03-04T15:33:08.663",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:56.710",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-1730."
"value": "Microsoft Exchange Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24089",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.347",
"lastModified": "2021-03-12T16:19:21.740",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:56.913",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24092",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:15.600",
"lastModified": "2021-03-04T15:13:50.217",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:57.120",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -199,7 +219,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24099",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:15.977",
"lastModified": "2021-03-04T15:12:23.197",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:57.327",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24100",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.040",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:57.530",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24101",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.100",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:57.717",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24104",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.550",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:57.910",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Spoofing Vulnerability"
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.5,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24105",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.303",
"lastModified": "2021-03-03T21:06:04.740",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:58.113",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Package Managers Configurations Remote Code Execution Vulnerability"
"value": "<p>Depending on configuration of various package managers it is possible for an attacker to insert a malicious package into a package manager's repository which can be retrieved and used during development, build, and release processes. This insertion could lead to remote code execution. We believe this vulnerability affects multiple package managers across multiple languages, including but not limited to: Python/pip, .NET/NuGet, Java/Maven, JavaScript/npm.</p>\n<p><strong>Attack scenarios</strong></p>\n<p>An attacker could take advantage of this ecosystem-wide issue to cause harm in a variety of ways. The original attack scenarios were discovered by Alex Birsan and are detailed in their whitepaper, <a href=\"https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610\">Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies</a>.</p>\n<ul>\n<li><p>With basic knowledge of the target ecosystems, an attacker could create an empty shell for a package and insert malicious code in the install scripts, give it a high version, and publish it to the public repository. Vulnerable victim machines will download the higher version of the package between the public and private repositories and attempt to install it. Due to code incompatibility it will probably error out upon import or upon compilation, making it easier to detect; however the attacker would have gained code execution by that point.</p>\n</li>\n<li><p>An advanced attacker with some inside knowledge of the target could take a copy of a working package, insert the malicious code (in the package itself or in the install), and then publish it to a public repository. The package will likely install and import correctly, granting the attacker an initial foothold and persistence.</p>\n</li>\n</ul>\n<p>These two methods could affect target organizations at any of these various levels:</p>\n<ul>\n<li>Developer machines</li>\n<li>An entire team if the configuration to import the malicious package is uploaded to a code repository</li>\n<li>Continuous integration pipelines if they pull the malicious packages during the build, test, and/or deploy stages</li>\n<li>Customers, download servers, production services if the malicious code has not been detected</li>\n</ul>\n<p>This remote code execution vulnerability can only be addressed by reconfiguring installation tools and workflows, and not by correcting anything in the package repositories themselves. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>\n"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24108",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.707",
"lastModified": "2021-03-18T01:41:43.673",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:58.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27057, CVE-2021-27059."
"value": "Microsoft Office Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24109",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.447",
"lastModified": "2022-05-03T16:04:40.443",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:58.583",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24110",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.787",
"lastModified": "2021-03-12T16:19:55.727",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:58.780",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24111",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.507",
"lastModified": "2021-03-09T14:38:48.860",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:58.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-24112",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.570",
"lastModified": "2021-07-07T19:34:22.050",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:59.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26701."
"value": ".NET Core Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24113",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.633",
"lastModified": "2021-07-08T16:58:22.333",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:59.373",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-24114",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.710",
"lastModified": "2022-06-28T14:11:45.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:59.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-26411",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.863",
"lastModified": "2022-05-03T16:04:40.443",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:59.767",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Internet Explorer and Edge Memory Corruption Vulnerability",
"cisaVulnerabilityName": "Microsoft Internet Explorer Memory Corruption Vulnerability",
"descriptions": [
{
"lang": "en",
@ -21,8 +21,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
@ -74,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-416"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-26412",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:11.853",
"lastModified": "2021-03-09T17:41:27.087",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:15:59.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26700",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.850",
"lastModified": "2021-03-03T19:58:22.257",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:00.217",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-26701",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-02-25T23:15:16.913",
"lastModified": "2023-11-07T03:31:48.063",
"lastModified": "2023-12-29T17:16:00.430",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112."
"value": ".NET Core Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-26854",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.040",
"lastModified": "2021-03-09T17:47:58.327",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:00.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,16 +2,16 @@
"id": "CVE-2021-26855",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.103",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:00.847",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft OWA Exchange Control Panel (ECP) Exploit Chain",
"cisaVulnerabilityName": "Microsoft Exchange Server Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -21,8 +21,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

View File

@ -2,16 +2,16 @@
"id": "CVE-2021-26857",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.167",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:01.073",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Unified Messaging Deserialization Vulnerability",
"cisaVulnerabilityName": "Microsoft Exchange Server Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -21,7 +21,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -39,6 +39,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,16 +2,16 @@
"id": "CVE-2021-26858",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-03T00:15:12.227",
"lastModified": "2021-03-08T20:46:51.823",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:01.327",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft OWA Exchange Control Panel (ECP) Exploit Chain",
"cisaVulnerabilityName": "Microsoft Exchange Server Remote Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -21,7 +21,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -39,6 +39,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26859",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:13.973",
"lastModified": "2021-03-17T19:42:09.920",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:01.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-26902",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-03-11T16:15:16.723",
"lastModified": "2021-03-12T16:20:58.673",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-29T17:16:01.750",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

Some files were not shown because too many files have changed in this diff Show More