diff --git a/CVE-1999/CVE-1999-02xx/CVE-1999-0239.json b/CVE-1999/CVE-1999-02xx/CVE-1999-0239.json index dc817a717d0..e671d256aa4 100644 --- a/CVE-1999/CVE-1999-02xx/CVE-1999-0239.json +++ b/CVE-1999/CVE-1999-02xx/CVE-1999-0239.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0239", "sourceIdentifier": "cve@mitre.org", "published": "1998-01-01T05:00:00.000", - "lastModified": "2008-09-09T12:34:03.477", + "lastModified": "2024-02-02T02:16:14.993", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -66,5 +88,20 @@ ] } ], - "references": [] + "references": [ + { + "url": "http://www.osvdb.org/122", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1731", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] + } + ] } \ No newline at end of file diff --git a/CVE-1999/CVE-1999-15xx/CVE-1999-1568.json b/CVE-1999/CVE-1999-15xx/CVE-1999-1568.json index ba6892dff3c..6b6f37e60e9 100644 --- a/CVE-1999/CVE-1999-15xx/CVE-1999-1568.json +++ b/CVE-1999/CVE-1999-15xx/CVE-1999-1568.json @@ -2,8 +2,8 @@ "id": "CVE-1999-1568", "sourceIdentifier": "cve@mitre.org", "published": "1999-01-01T05:00:00.000", - "lastModified": "2017-10-10T01:29:06.937", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:49:01.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -58,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ncftpd:ncftpd_ftp_server:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.4.0", - "matchCriteriaId": "EAF82E73-3743-440F-BB2A-A23986512F72" + "criteria": "cpe:2.3:a:ncftp:ncftpd_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.1", + "matchCriteriaId": "3D72A5C7-F7F3-41D4-A909-DBBD0B00C05E" } ] } @@ -70,15 +92,27 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=91981352617720&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/archive/1/12699", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1833", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2000/CVE-2000-03xx/CVE-2000-0342.json b/CVE-2000/CVE-2000-03xx/CVE-2000-0342.json index a1df9821034..810d0cf0787 100644 --- a/CVE-2000/CVE-2000-03xx/CVE-2000-0342.json +++ b/CVE-2000/CVE-2000-03xx/CVE-2000-0342.json @@ -2,7 +2,7 @@ "id": "CVE-2000-0342", "sourceIdentifier": "cve@mitre.org", "published": "2000-04-28T04:00:00.000", - "lastModified": "2008-09-10T19:04:11.210", + "lastModified": "2024-02-02T02:05:13.933", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-59" } ] } @@ -58,13 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B" + "criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5" } ] } @@ -76,16 +93,25 @@ "url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077", "source": "cve@mitre.org", "tags": [ + "Not Applicable", "Vendor Advisory" ] }, { "url": "http://www.peacefire.org/security/stealthattach/explanation.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "http://www.securityfocus.com/bid/1157", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-07xx/CVE-2001-0766.json b/CVE-2001/CVE-2001-07xx/CVE-2001-0766.json index 31fe189fa75..f34fc3434f8 100644 --- a/CVE-2001/CVE-2001-07xx/CVE-2001-0766.json +++ b/CVE-2001/CVE-2001-07xx/CVE-2001-0766.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0766", "sourceIdentifier": "cve@mitre.org", "published": "2001-10-18T04:00:00.000", - "lastModified": "2008-09-05T20:24:52.847", + "lastModified": "2024-02-02T02:13:13.170", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,13 +66,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -62,6 +85,17 @@ "matchCriteriaId": "6DDD2F69-CFD4-4DEA-B43A-1337EEFA95A3" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8" + } + ] } ] } @@ -71,6 +105,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -79,8 +114,11 @@ "url": "http://www.securityfocus.com/bid/2852", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2001/CVE-2001-07xx/CVE-2001-0795.json b/CVE-2001/CVE-2001-07xx/CVE-2001-0795.json index 071202f45fa..f59f1770008 100644 --- a/CVE-2001/CVE-2001-07xx/CVE-2001-0795.json +++ b/CVE-2001/CVE-2001-07xx/CVE-2001-0795.json @@ -2,7 +2,7 @@ "id": "CVE-2001-0795", "sourceIdentifier": "cve@mitre.org", "published": "2001-10-18T04:00:00.000", - "lastModified": "2008-09-05T20:24:57.003", + "lastModified": "2024-02-02T02:12:41.587", "vulnStatus": "Analyzed", "descriptions": [ { @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -58,8 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:perception:liteserve:1.25:*:*:*:*:*:*:*", - "matchCriteriaId": "DE2518FF-F247-409F-9711-CDA8AFFCFF5F" + "criteria": "cpe:2.3:a:cmfperception:liteserve:1.25:*:*:*:*:*:*:*", + "matchCriteriaId": "5281A4D3-2846-453A-A42C-21C9CDDDEF0D" } ] } @@ -71,6 +93,7 @@ "url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0328.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -79,8 +102,11 @@ "url": "http://www.securityfocus.com/bid/2926", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] } diff --git a/CVE-2001/CVE-2001-10xx/CVE-2001-1042.json b/CVE-2001/CVE-2001-10xx/CVE-2001-1042.json index dcebe822a72..649faa20a1d 100644 --- a/CVE-2001/CVE-2001-10xx/CVE-2001-1042.json +++ b/CVE-2001/CVE-2001-10xx/CVE-2001-1042.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1042", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-02T04:00:00.000", - "lastModified": "2017-12-19T02:29:31.473", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:05:03.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-59" } ] } @@ -71,6 +93,9 @@ "url": "http://www.securityfocus.com/archive/1/194443", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -78,13 +103,20 @@ "url": "http://www.securityfocus.com/bid/2960", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6760", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-10xx/CVE-2001-1043.json b/CVE-2001/CVE-2001-10xx/CVE-2001-1043.json index 41f6775ebe7..7f53fbba6f3 100644 --- a/CVE-2001/CVE-2001-10xx/CVE-2001-1043.json +++ b/CVE-2001/CVE-2001-10xx/CVE-2001-1043.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1043", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-01T04:00:00.000", - "lastModified": "2017-10-10T01:29:58.797", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:04:50.130", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-59" } ] } @@ -67,10 +89,20 @@ } ], "references": [ + { + "url": "http://www.osvdb.org/1886", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/archive/1/194445", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -78,13 +110,20 @@ "url": "http://www.securityfocus.com/bid/2961", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6760", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-12xx/CVE-2001-1238.json b/CVE-2001/CVE-2001-12xx/CVE-2001-1238.json index cea89b1ea80..fccf6f0062b 100644 --- a/CVE-2001/CVE-2001-12xx/CVE-2001-1238.json +++ b/CVE-2001/CVE-2001-12xx/CVE-2001-1238.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1238", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-16T04:00:00.000", - "lastModified": "2019-04-30T14:27:13.710", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:11:33.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -60,31 +82,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*", - "matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7" } ] } @@ -96,6 +93,9 @@ "url": "http://www.securityfocus.com/archive/1/197195", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, @@ -103,13 +103,20 @@ "url": "http://www.securityfocus.com/bid/3033", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6919", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-13xx/CVE-2001-1386.json b/CVE-2001/CVE-2001-13xx/CVE-2001-1386.json index e30dc651a3c..2efabe420c3 100644 --- a/CVE-2001/CVE-2001-13xx/CVE-2001-1386.json +++ b/CVE-2001/CVE-2001-13xx/CVE-2001-1386.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1386", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-01T04:00:00.000", - "lastModified": "2017-10-10T01:30:02.890", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:02:58.643", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-59" } ] } @@ -58,68 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BE581DA0-0DEC-4C2D-B2CA-FFBDC39FAF95" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.4.1_rc11:*:*:*:*:*:*:*", - "matchCriteriaId": "0F0D720E-2C84-4AD8-8B2A-9F73E3396AB7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.4.1_rc12:*:*:*:*:*:*:*", - "matchCriteriaId": "599F7D23-563D-439A-9868-F9169569282A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.40:*:*:*:*:*:*:*", - "matchCriteriaId": "B9B1592D-0D0E-4B03-9414-82AAD16B680E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.41_rc14:*:*:*:*:*:*:*", - "matchCriteriaId": "0BFFAD53-125B-4633-9AC4-A580B17A60F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.41_rc14:*:pro:*:*:*:*:*", - "matchCriteriaId": "8D405E5C-7528-44FA-A923-6467E5C00E7A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "82BD6A19-CDF4-4873-9D1A-BD071DB16540" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0:*:pro:*:*:*:*:*", - "matchCriteriaId": "48834DE9-009F-4ADF-882C-731AAE13216C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r3:*:*:*:*:*:*:*", - "matchCriteriaId": "24891A6D-A378-4598-BD99-2EB36166EC61" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r4:*:*:*:*:*:*:*", - "matchCriteriaId": "EA997791-D567-4F7F-86B2-C17C9DF846B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r4:*:pro:*:*:*:*:*", - "matchCriteriaId": "02CE0404-0A9F-4D9B-BED8-175B91BD43D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r5:*:*:*:*:*:*:*", - "matchCriteriaId": "76D31E58-1956-4462-9808-7C46807B2CDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r5:*:pro:*:*:*:*:*", - "matchCriteriaId": "EDF7F8CF-6679-4F18-9D35-CA5063FC29EC" + "criteria": "cpe:2.3:a:texasimperialsoftware:wftpd:3.00:r5:*:*:pro:*:*:*", + "matchCriteriaId": "12A21C8C-E924-4643-939F-BFD31BFDA1B4" } ] } @@ -129,20 +91,32 @@ "references": [ { "url": "http://www.securityfocus.com/archive/1/194442", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/2957", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6760", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2001/CVE-2001-13xx/CVE-2001-1391.json b/CVE-2001/CVE-2001-13xx/CVE-2001-1391.json index 723cddaad34..6d47f7594c4 100644 --- a/CVE-2001/CVE-2001-13xx/CVE-2001-1391.json +++ b/CVE-2001/CVE-2001-13xx/CVE-2001-1391.json @@ -2,8 +2,8 @@ "id": "CVE-2001-1391", "sourceIdentifier": "cve@mitre.org", "published": "2001-04-17T04:00:00.000", - "lastModified": "2017-10-10T01:30:02.970", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:56:22.740", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -59,8 +81,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.2.19", - "matchCriteriaId": "94EC6E59-F40D-4499-9EB3-7D7E175ABDE9" + "versionEndExcluding": "2.2.19", + "matchCriteriaId": "97E2B094-820F-4AA6-B648-257FBA39E2EE" } ] } @@ -70,50 +92,86 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=98575345009963&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://marc.info/?l=bugtraq&m=98653252326445&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=98684172109474&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://marc.info/?l=bugtraq&m=98759029811377&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://marc.info/?l=bugtraq&m=99013830726309&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.linux.org.uk/VERSION/relnotes.2219.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2001-047.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11162", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.debian.org/security/2001/dsa-047", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-00xx/CVE-2002-0083.json b/CVE-2002/CVE-2002-00xx/CVE-2002-0083.json index 1da0bd09909..74c8f7c550c 100644 --- a/CVE-2002/CVE-2002-00xx/CVE-2002-0083.json +++ b/CVE-2002/CVE-2002-00xx/CVE-2002-0083.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0083", "sourceIdentifier": "cve@mitre.org", "published": "2002-03-15T05:00:00.000", - "lastModified": "2016-10-18T02:16:01.810", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:52:51.803", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-193" } ] } @@ -72,63 +94,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "78135400-BA1A-42AA-BE17-5588442BCF11" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "78F2EDC0-3189-4523-882B-9188C852F793" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E2991C07-5486-4590-A74E-46A379DD3339" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4EB9BE06-0A36-4853-ADF4-9C1A1854278A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FC57F38-6545-497B-B6DA-FCAF51755988" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*", - "matchCriteriaId": "0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*", - "matchCriteriaId": "4B235167-9554-4431-88C5-9472DD36FCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E05D8E86-EC01-4589-B372-4DEB7845C81F" + "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0", + "versionEndExcluding": "3.1", + "matchCriteriaId": "57BE3D9D-42CA-45A4-A2BB-A7154F177A45" }, { "vulnerable": true, @@ -323,98 +292,174 @@ "references": [ { "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=101552065005254&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=101553908201861&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=101561384821761&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=101586991827622&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://online.securityfocus.com/advisories/3960", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://online.securityfocus.com/archive/1/264657", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2002/dsa-119", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.iss.net/security_center/static/8383.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.linuxsecurity.com/advisories/other_advisory-1937.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openbsd.org/advisories/ssh_channelalloc.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/730", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-043.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/4241", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-04xx/CVE-2002-0485.json b/CVE-2002/CVE-2002-04xx/CVE-2002-0485.json index 9a7376f60da..c48e886f5d4 100644 --- a/CVE-2002/CVE-2002-04xx/CVE-2002-0485.json +++ b/CVE-2002/CVE-2002-04xx/CVE-2002-0485.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0485", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2016-10-18T02:20:28.680", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:17:09.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -69,11 +91,17 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=101684260510079&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=vuln-dev&m=101681724810317&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-06xx/CVE-2002-0653.json b/CVE-2002/CVE-2002-06xx/CVE-2002-0653.json index c39fc9ede7c..9fb6c3606bc 100644 --- a/CVE-2002/CVE-2002-06xx/CVE-2002-0653.json +++ b/CVE-2002/CVE-2002-06xx/CVE-2002-0653.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0653", "sourceIdentifier": "cve@mitre.org", "published": "2002-07-11T04:00:00.000", - "lastModified": "2016-10-18T02:21:07.343", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:50:09.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -58,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:modssl:mod_ssl:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.8.9", - "matchCriteriaId": "60B71520-78FD-4935-BC0B-D1F299DD2B11" + "matchCriteriaId": "844D1E7A-906B-421C-8C22-A612E16C72C5" } ] } @@ -70,75 +92,132 @@ "references": [ { "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-031.0.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0350.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/hp/2002-q3/0018.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000504", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=102513970919836&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=102563469326072&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://marc.info/?l=vuln-dev&m=102477330617604&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2002-164.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2002/dsa-135", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.iss.net/security_center/static/9415.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-048.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2002_028_mod_ssl.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-134.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-135.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-136.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-146.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-106.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/5084", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2002/CVE-2002-08xx/CVE-2002-0844.json b/CVE-2002/CVE-2002-08xx/CVE-2002-0844.json index 961ee6543f6..081a392cadf 100644 --- a/CVE-2002/CVE-2002-08xx/CVE-2002-0844.json +++ b/CVE-2002/CVE-2002-08xx/CVE-2002-0844.json @@ -2,8 +2,8 @@ "id": "CVE-2002-0844", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2017-10-10T01:30:07.610", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:49:53.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -58,8 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:derek_price:cvsd:1.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F4BFB7BD-815B-4650-AB9B-54853F1F9893" + "criteria": "cpe:2.3:a:distrotech:cvs:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.11.2", + "matchCriteriaId": "D5C6F868-918D-4055-A13A-4D752FC1BFD4" } ] } @@ -71,18 +94,23 @@ "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-035.0.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0081.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", "Vendor Advisory" @@ -90,23 +118,36 @@ }, { "url": "http://marc.info/?l=bugtraq&m=102233767925177&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-004.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/4829", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9175", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-02xx/CVE-2003-0252.json b/CVE-2003/CVE-2003-02xx/CVE-2003-0252.json index 3c0c902e172..882af412624 100644 --- a/CVE-2003/CVE-2003-02xx/CVE-2003-0252.json +++ b/CVE-2003/CVE-2003-02xx/CVE-2003-0252.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0252", "sourceIdentifier": "cve@mitre.org", "published": "2003-08-18T04:00:00.000", - "lastModified": "2018-05-03T01:29:19.990", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:56:45.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -62,38 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "025FEFFD-12DD-4D29-A0FA-93DF96AFCFF5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:0.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "474B82D5-5D48-41ED-B2C1-68907A27491F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:0.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "69A6C9CB-446C-4ACF-B2CA-41A1BD5F229A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:0.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "3E68D7A7-DCEA-417D-AA56-D7B2EB410CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "813B76CA-5083-4697-A484-435113B7FF88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0964EDA2-D86C-4189-9B03-61A292601649" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:nfs:nfs-utils:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "2EFD8CFB-A24A-49F0-856C-4B985E203C9A" + "criteria": "cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "DF4ADA89-AAB7-4BFE-8FA8-A36123830844" } ] } @@ -105,6 +98,7 @@ "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0023.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -112,75 +106,137 @@ "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0024.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://isec.pl/vulnerabilities/isec-0010-linux-nfs-utils.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://marc.info/?l=bugtraq&m=105820223707191&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=105830921519513&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://marc.info/?l=bugtraq&m=105839032403325&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/9259", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1007187", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001262.1-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2003/dsa-349", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/258564", "source": "cve@mitre.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:076", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2003_031_nfs_utils.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-206.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-207.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/8179", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.turbolinux.com/security/TLSA-2003-44.txt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12600", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A443", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-04xx/CVE-2003-0411.json b/CVE-2003/CVE-2003-04xx/CVE-2003-0411.json index c045eeb0d2c..e8af0c7bd25 100644 --- a/CVE-2003/CVE-2003-04xx/CVE-2003-0411.json +++ b/CVE-2003/CVE-2003-04xx/CVE-2003-0411.json @@ -2,8 +2,8 @@ "id": "CVE-2003-0411", "sourceIdentifier": "cve@mitre.org", "published": "2003-06-30T04:00:00.000", - "lastModified": "2016-10-18T02:33:41.330", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:18:03.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,13 +70,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -62,13 +85,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*", - "matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66" + "criteria": "cpe:2.3:a:oracle:sun_one_application_server:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7514FCF4-3C0C-49F4-929E-A5EF62AD8FE2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8" }, { - "vulnerable": true, - "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*", - "matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61" + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A" } ] } @@ -78,24 +112,33 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=105409846029475&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F55221&zone_32=category%3Asecurity", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000610.1-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.ciac.org/ciac/bulletins/n-103.shtml", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -104,6 +147,7 @@ "url": "http://www.iss.net/security_center/static/12093.php", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] @@ -112,14 +156,20 @@ "url": "http://www.securityfocus.com/bid/7709", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Patch", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "http://www.spidynamics.com/sunone_alert.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2004/CVE-2004-03xx/CVE-2004-0346.json b/CVE-2004/CVE-2004-03xx/CVE-2004-0346.json index 5f753196fb4..fb927d6f8b5 100644 --- a/CVE-2004/CVE-2004-03xx/CVE-2004-0346.json +++ b/CVE-2004/CVE-2004-03xx/CVE-2004-0346.json @@ -2,8 +2,8 @@ "id": "CVE-2004-0346", "sourceIdentifier": "cve@mitre.org", "published": "2004-11-23T05:00:00.000", - "lastModified": "2017-07-11T01:30:05.353", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:48:38.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-193" } ] } @@ -58,23 +80,25 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "31D12FAE-5839-4123-876E-0A32DA2B1A42" + "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.7", + "versionEndExcluding": "1.2.9", + "matchCriteriaId": "2C0C66FF-D0E0-48D9-9181-F403D503E040" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "C11D565E-0A90-4093-AA87-34A6DAE68E88" + "criteria": "cpe:2.3:a:proftpd:proftpd:1.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8EC036C6-445D-4A6E-8B22-799CE611C05C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "A9C5CBBA-43CE-4D77-9DA4-D4C4E010978B" + "criteria": "cpe:2.3:a:proftpd:proftpd:1.2.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "44670EA1-33E7-486B-80C0-743C09632F65" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc2:*:*:*:*:*:*:*", - "matchCriteriaId": "89CD92BA-407E-4089-A98F-6D1309D8C294" + "criteria": "cpe:2.3:a:proftpd:proftpd:1.2.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "777FBAE6-3BA4-436A-85FC-B59DCFB89160" } ] } @@ -84,19 +108,29 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=107824679817240&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/9782", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", + "Third Party Advisory", + "VDB Entry", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15387", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-02xx/CVE-2005-0269.json b/CVE-2005/CVE-2005-02xx/CVE-2005-0269.json index 03370e901cb..f09b2b3bd97 100644 --- a/CVE-2005/CVE-2005-02xx/CVE-2005-0269.json +++ b/CVE-2005/CVE-2005-02xx/CVE-2005-0269.json @@ -2,8 +2,8 @@ "id": "CVE-2005-0269", "sourceIdentifier": "cve@mitre.org", "published": "2005-05-02T04:00:00.000", - "lastModified": "2017-07-11T01:32:10.890", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:15:17.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-178" } ] } @@ -58,58 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.30:*:*:*:*:*:*:*", - "matchCriteriaId": "08E70D59-49EB-4A2B-80CA-0BD651050DDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CCBA9CFF-F981-4603-9899-AF33D9A06E9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.32:*:*:*:*:*:*:*", - "matchCriteriaId": "F384348F-4D25-4554-96FD-DAD9F114D6F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.33:*:*:*:*:*:*:*", - "matchCriteriaId": "E64226B8-DC52-495E-BBB7-D87E957959CC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.34:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8ABCF-ECEE-4D8E-8C21-D3E3FBA3A8AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.35:*:*:*:*:*:*:*", - "matchCriteriaId": "9FE17003-86D7-4DBF-8505-DA1C0A577379" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.36:*:*:*:*:*:*:*", - "matchCriteriaId": "008FCD6F-3031-4FB7-AE33-EF570143C52F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.37:*:*:*:*:*:*:*", - "matchCriteriaId": "458802ED-A3D7-433C-AE78-135384BEC79E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.38:*:*:*:*:*:*:*", - "matchCriteriaId": "FD69FD0C-DCED-4CF7-8D60-5E74BA019C84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.39:*:*:*:*:*:*:*", - "matchCriteriaId": "83D1664D-CE27-4AFA-8A91-13F7519ABDCF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:3.40:*:*:*:*:*:*:*", - "matchCriteriaId": "0E54CBFB-282D-4036-9D6E-C1EC216517E3" + "criteria": "cpe:2.3:a:sir:gnuboard:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.40", + "matchCriteriaId": "BFF591A1-0AFC-4182-9AC2-31933C6C9B33" } ] } @@ -119,15 +92,35 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=110477648219738&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/13711", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/12149", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18729", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-05xx/CVE-2005-0587.json b/CVE-2005/CVE-2005-05xx/CVE-2005-0587.json index ee27e20f027..625893665d9 100644 --- a/CVE-2005/CVE-2005-05xx/CVE-2005-0587.json +++ b/CVE-2005/CVE-2005-05xx/CVE-2005-0587.json @@ -2,8 +2,8 @@ "id": "CVE-2005-0587", "sourceIdentifier": "secalert@redhat.com", "published": "2005-03-25T05:00:00.000", - "lastModified": "2017-10-11T01:29:58.187", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:03:45.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-59" } ] } @@ -58,158 +80,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4" + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.1", + "matchCriteriaId": "F23F3867-1318-4ACF-A3A6-F0605BDA8BA3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", - "matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "010B34F4-910E-4515-990B-8E72DF009578" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C656A621-BE62-4BB8-9B25-A3916E60FA12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "4D3F91A1-7DD9-4146-8BA4-BE594C66DD30" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*", - "matchCriteriaId": "82A6419D-0E94-4D80-8B07-E5AB4DBA2F28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ED69BEB9-8D83-415B-826D-9D17FB67976B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "BCDB64E5-AE26-43DF-8A66-654D5D22A635" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*", - "matchCriteriaId": "3D8CB42F-8F05-45A6-A408-50A11CC132DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*", - "matchCriteriaId": "407F69BE-4026-4B26-AC31-11E7CC942760" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*", - "matchCriteriaId": "6E8264B5-4D4B-453D-B599-E2AD533A0CF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "ED9D75F1-8333-43DE-A08B-142E4C5899D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "6BF63077-4E98-497D-8CE6-B84B022DB21D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*", - "matchCriteriaId": "2FEC6B13-3088-4ECB-9D81-6480F439601C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*", - "matchCriteriaId": "20ECA520-780A-4EF8-8C80-B7564F4148B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "FCEAEDEB-0EE7-4221-B9B8-65438580D331" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*", - "matchCriteriaId": "78A75EE3-DC19-4F21-86F4-834FCEAFEFA2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*", - "matchCriteriaId": "F610FFD5-DF37-4075-AE8B-8D89DF6205A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D093FD25-94C8-49B8-A452-438023BFB105" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*", - "matchCriteriaId": "3346E7D0-D7EF-4182-BD86-837F14EEB9FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*", - "matchCriteriaId": "150F1B28-0FAB-4880-B1D5-7F244A1C4D31" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "2FE7EA3B-3BF8-4696-9488-78506074D62D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CCFD7AF7-0FE9-4F56-98B0-60FC7F7F1B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C883B45F-D28D-428E-AAF7-F93522A229DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EFA659B9-2A00-45A6-A462-4E0A20FB7F81" + "criteria": "cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.6", + "matchCriteriaId": "E6F232DA-F897-4429-922E-F5CFF865A8AA" } ] } @@ -217,6 +96,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/19823", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.mozilla.org/security/announce/mfsa2005-21.html", "source": "secalert@redhat.com", @@ -226,15 +112,26 @@ }, { "url": "http://www.novell.com/linux/security/advisories/2006_04_25.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/12659", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100037", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-36xx/CVE-2005-3623.json b/CVE-2005/CVE-2005-36xx/CVE-2005-3623.json index ac39f03859c..a3f173718c5 100644 --- a/CVE-2005/CVE-2005-36xx/CVE-2005-3623.json +++ b/CVE-2005/CVE-2005-36xx/CVE-2005-3623.json @@ -2,8 +2,8 @@ "id": "CVE-2005-3623", "sourceIdentifier": "secalert@redhat.com", "published": "2005-12-31T05:00:00.000", - "lastModified": "2017-10-11T01:30:26.810", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:19:08.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -44,7 +44,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-862" } ] } @@ -71,6 +71,7 @@ "url": "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Patch" ] }, @@ -78,31 +79,81 @@ "url": "http://lkml.org/lkml/2005/12/23/171", "source": "secalert@redhat.com", "tags": [ + "Mailing List", "Patch" ] }, + { + "url": "http://secunia.com/advisories/18788", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/19038", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/21465", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/22417", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_06_kernel.html", "source": "secalert@redhat.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0575.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/16570", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11707", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-22xx/CVE-2007-2237.json b/CVE-2007/CVE-2007-22xx/CVE-2007-2237.json index 9dd2bda808f..941c41546a1 100644 --- a/CVE-2007/CVE-2007-22xx/CVE-2007-2237.json +++ b/CVE-2007/CVE-2007-22xx/CVE-2007-2237.json @@ -2,8 +2,8 @@ "id": "CVE-2007-2237", "sourceIdentifier": "cret@cert.org", "published": "2007-06-06T20:30:00.000", - "lastModified": "2018-10-16T16:42:44.023", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:57:51.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-369" } ] } @@ -62,33 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", - "matchCriteriaId": "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*", - "matchCriteriaId": "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*", - "matchCriteriaId": "C29F02ED-85FC-4D22-A6DE-5F9C77ECCD70" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*", - "matchCriteriaId": "1AB9988B-5A9C-4F6D-BCCC-4D03AC6E4CF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*", - "matchCriteriaId": "FB2BE2DE-7B06-47ED-A674-15D45448F357" + "criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3" } ] } @@ -96,40 +93,77 @@ } ], "references": [ + { + "url": "http://osvdb.org/38494", + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.csis.dk/dk/forside/GdiPlus.pdf", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.kb.cert.org/vuls/id/290961", "source": "cret@cert.org", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.securityfocus.com/archive/1/470746/100/0/threaded", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/24346", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1018202", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/2083", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34743", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.exploit-db.com/exploits/4044", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-27xx/CVE-2007-2723.json b/CVE-2007/CVE-2007-27xx/CVE-2007-2723.json index 0f20cc50c7a..802a5a64cfe 100644 --- a/CVE-2007/CVE-2007-27xx/CVE-2007-2723.json +++ b/CVE-2007/CVE-2007-27xx/CVE-2007-2723.json @@ -2,8 +2,8 @@ "id": "CVE-2007-2723", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-16T22:30:00.000", - "lastModified": "2018-10-16T16:45:15.353", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:59:48.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-369" } ] } @@ -62,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:media_player_classic:media_player_classic:6.4.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E45C3556-C056-46F4-A053-BC94233C12BF" + "criteria": "cpe:2.3:a:mpc-hc:media_player_classic:6.4.9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFD3824-C5CC-4891-B8A0-206014A5A1C0" } ] } @@ -71,21 +93,47 @@ } ], "references": [ + { + "url": "http://osvdb.org/37376", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://www.securityfocus.com/archive/1/468626/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/468758/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/23991", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34299", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-42xx/CVE-2007-4268.json b/CVE-2007/CVE-2007-42xx/CVE-2007-4268.json index 6287eefb6de..db850d30f4f 100644 --- a/CVE-2007/CVE-2007-42xx/CVE-2007-4268.json +++ b/CVE-2007/CVE-2007-42xx/CVE-2007-4268.json @@ -2,9 +2,9 @@ "id": "CVE-2007-4268", "sourceIdentifier": "cve@mitre.org", "published": "2007-11-15T01:46:00.000", - "lastModified": "2017-07-29T01:32:49.300", - "vulnStatus": "Modified", - "evaluatorImpact": "\"By sending a maliciously crafted AppleTalk message, a local user may\r\ncause an unexpected system shutdown or arbitrary code execution with\r\nsystem privileges.\"", + "lastModified": "2024-02-02T02:35:40.717", + "vulnStatus": "Analyzed", + "evaluatorImpact": "\"By sending a maliciously crafted AppleTalk message, a local user may\ncause an unexpected system shutdown or arbitrary code execution with\nsystem privileges.\"", "descriptions": [ { "lang": "en", @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -49,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-189" + "value": "CWE-681" } ] } @@ -63,58 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715" + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.4.0", + "versionEndIncluding": "10.4.10", + "matchCriteriaId": "ED9822D0-73F1-4B57-ADB5-0EBA7F78C7F1" } ] } @@ -124,38 +98,74 @@ "references": [ { "url": "http://docs.info.apple.com/article.html?artnum=307041", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=628", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/27643", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://securitytracker.com/id?1018950", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/26444", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.vupen.com/english/advisories/2007/3868", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38476", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2007/CVE-2007-49xx/CVE-2007-4988.json b/CVE-2007/CVE-2007-49xx/CVE-2007-4988.json index ba53aca20b6..94bb4e10ab6 100644 --- a/CVE-2007/CVE-2007-49xx/CVE-2007-4988.json +++ b/CVE-2007/CVE-2007-49xx/CVE-2007-4988.json @@ -2,8 +2,8 @@ "id": "CVE-2007-4988", "sourceIdentifier": "cve@mitre.org", "published": "2007-09-24T22:17:00.000", - "lastModified": "2018-10-15T21:39:24.333", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:45:07.960", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,11 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" - }, - { - "lang": "en", - "value": "CWE-189" + "value": "CWE-681" } ] } @@ -66,288 +84,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0D83FADC-4C7F-4C16-BBAA-9883D7449744" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.5-9", + "matchCriteriaId": "12DE5EB8-BDC6-4D86-B3DD-0610E9DF93D9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", + "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "04A019EA-DB16-41D5-A625-CBD96F24416E" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D2563ABE-D1C3-4AB8-BC41-8029E358C2CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B45B5EE8-00FB-46FE-9A26-7468AD30B540" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6534A963-C0A7-47D6-8E1B-B8D0F3933428" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "8BDC9494-E79B-4497-8413-A44DF326ABB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2_1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "22890DA5-6F77-4CA5-8DE4-0C66C3A3D370" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.3_.2_1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5E16A926-05F2-495E-B17B-D23624F55A2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2D1F61BB-FF5B-4196-8723-AA165B077E36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B02E4063-E2B2-4EC5-9864-D2FB3E73F574" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_20030409:*:*:*:*:*:*:*", - "matchCriteriaId": "B3FA6C29-443C-4A33-AA14-56ADA6D052F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "193A610A-5E5E-4A87-A501-902100D1C2AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.7.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B9C7FD38-93D3-456B-ABD5-9A2A8A0716E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A27CAC75-BFE8-4865-A6AE-20225BFCDBA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "6393827E-8F17-4C95-B1E2-D6049B8AA63F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "46F682CD-0117-4770-877F-1F3903BAFE04" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5717E4CF-15CD-4369-801F-7E113F0FAFB3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A34B9CBD-54BC-4131-820F-9483E50086BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7AD7EB24-20F1-493F-BD38-DF39638C319B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2A6E66D8-BEC4-4E0D-BAAE-979618405C21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5E62DFAA-1EFC-40D6-A4B5-9113DF0656B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D8BD0D69-A809-4DD3-824B-C68E3EF4F724" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F91C63C5-765B-4511-B6CF-CA09433DE051" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "ABC271B0-ACAC-478E-B00B-FFBAAE33B5E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "DF9BACC6-DEF1-4C20-B627-3AA55471B372" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8CA96D5B-FD43-418E-980C-22DEBA4FC03D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "83A3469D-AE33-4933-A4F2-3DEFF3F223F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A55053EA-780E-46A9-91AE-F983DD54D154" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8168249B-863D-44E3-8BC3-B877A64981B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A688471B-3A88-410B-AAD3-20A75E1A767E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "02F76B8D-D105-4106-B52C-FC201F5930AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8EB7AE5B-83D9-4DF5-A9A0-B0412D8C0B1B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "600590DA-A2F4-488F-B85B-9B3B86A8FC6B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "096FC2CB-49A7-444A-BDA6-802E123A9ED2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "0BB2E37B-323A-4336-B081-56BD32260E0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "311D7BB5-0740-4122-8465-B03B5C40351A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "03ADE3A3-8FA5-439A-97ED-6EE93ED43699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "11A48433-240E-4555-966B-4BA767AA3C6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D0900904-462F-47DF-82C8-DD69D3E1EC2B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CB80DF3F-DE3F-4CB3-B021-26B8D9F3B550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F2BF18B6-A20E-44D1-A9D1-0F7762E0C506" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "CDA9ACBD-6065-4340-B987-560BE5A54FE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "2AEEF22D-83DE-41FA-941C-C02C45D7B5DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "74068962-7689-4155-91D7-506CD30BAFB2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "8BD4D7D7-C230-4986-9CA8-C4C7F9B9DC88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "EDE3052B-3341-4B5C-A21F-4A10984D2641" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "8A57BE9F-C790-4BEF-9A91-E6C565A1C1D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "572F13C8-4FCC-4BF2-BECA-D957AC62DD51" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AB9DC98B-77B4-4CB3-BEAA-71ECC9805BAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "5D0F3B37-EE8D-46F3-861C-4D90E2699AAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E5410220-889F-4D5F-9C23-3442272F4327" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9A317A0F-D871-49B8-8D0D-EE96DF7B6622" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3_3:*:*:*:*:*:*:*", - "matchCriteriaId": "93E858A4-1BB5-4CEF-B2D4-EEA3DE3D8218" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3_5:*:*:*:*:*:*:*", - "matchCriteriaId": "D09D188F-0193-435C-BBAF-B3977B6997F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3_6:*:*:*:*:*:*:*", - "matchCriteriaId": "9EB9051F-CFA7-4ACC-AB6F-0FBB10A8A076" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "195D7B1C-7550-480A-B2B8-7D868B654674" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", + "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501" } ] } @@ -357,75 +121,188 @@ "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=186030", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/26926", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/27048", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/27309", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/27364", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/27439", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/28721", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/29786", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36260", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200710-27.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2009/dsa-1858", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.imagemagick.org/script/changelog.php", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/483572/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/25765", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", - "Patch" + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1018729", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/usn-523-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/3245", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36737", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://issues.rpath.com/browse/RPL-1743", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-65xx/CVE-2008-6548.json b/CVE-2008/CVE-2008-65xx/CVE-2008-6548.json index d9844045aba..89305096249 100644 --- a/CVE-2008/CVE-2008-65xx/CVE-2008-6548.json +++ b/CVE-2008/CVE-2008-65xx/CVE-2008-6548.json @@ -2,7 +2,7 @@ "id": "CVE-2008-6548", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-30T01:30:00.500", - "lastModified": "2009-03-30T04:00:00.000", + "lastModified": "2024-02-02T02:17:39.833", "vulnStatus": "Analyzed", "descriptions": [ { @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-862" } ] } @@ -75,6 +75,7 @@ "url": "http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -82,8 +83,16 @@ "url": "http://moinmo.in/SecurityFixes", "source": "cve@mitre.org", "tags": [ + "Release Notes", "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/48877", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2009/CVE-2009-37xx/CVE-2009-3781.json b/CVE-2009/CVE-2009-37xx/CVE-2009-3781.json index bd666fe28cb..f98b2a743c1 100644 --- a/CVE-2009/CVE-2009-37xx/CVE-2009-3781.json +++ b/CVE-2009/CVE-2009-37xx/CVE-2009-3781.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3781", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-26T17:30:00.420", - "lastModified": "2017-08-17T01:31:16.337", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:10:32.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,34 +48,22 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-862" } ] } ], "configurations": [ { - "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", - "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54" - } - ] - }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "989E928E-AB25-4B0E-B23E-28825343EA59" + "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:drupal:*:*", + "matchCriteriaId": "5157C153-BECD-4169-BCF7-FB8B6D99FB98" } ] } @@ -87,24 +75,23 @@ "url": "http://drupal.org/files/issues/filefield-node-access-fix-516104-3.patch", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Patch" ] }, { "url": "http://drupal.org/node/516104", "source": "cve@mitre.org", "tags": [ + "Issue Tracking", "Patch", - "Vendor Advisory" + "Third Party Advisory" ] }, { "url": "http://drupal.org/node/609874", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Release Notes" ] }, { @@ -112,19 +99,34 @@ "source": "cve@mitre.org", "tags": [ "Patch", - "Vendor Advisory" + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/37130", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/36792", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53897", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0258.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0258.json index 05452d33cec..a61cec92e14 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0258.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0258.json @@ -2,8 +2,8 @@ "id": "CVE-2010-0258", "sourceIdentifier": "secure@microsoft.com", "published": "2010-03-10T22:30:01.073", - "lastModified": "2018-10-12T21:56:41.913", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:38:22.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-843" } ] } @@ -82,13 +104,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", - "matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25" + "criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os_x:*:*", + "matchCriteriaId": "A78DC369-DCAE-4D75-8C33-0FFF108640F8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", - "matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260" + "criteria": "cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*", + "matchCriteriaId": "421ACF1B-1B21-4416-98ED-BAA5C210EAE5" }, { "vulnerable": true, @@ -102,38 +124,28 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*", - "matchCriteriaId": "E8A9B86A-21B8-4E2F-9DB8-1D1DFE718A0D" + "criteria": "cpe:2.3:a:microsoft:office_excel_viewer:-:sp1:*:*:*:*:*:*", + "matchCriteriaId": "EAC4BFBE-0AEF-42EA-9252-3E19A4ED6BF1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*", - "matchCriteriaId": "69286E7D-BA6E-479F-A9B3-2B9F54663847" + "criteria": "cpe:2.3:a:microsoft:office_excel_viewer:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "F142404A-9C14-4244-9364-23B90905C765" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*", - "matchCriteriaId": "E013CE59-0ABF-4542-A9E9-D295AA0FC2A2" + "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*", + "matchCriteriaId": "F007E987-9CCF-4786-AB23-C5F4AE51D5A6" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*", - "matchCriteriaId": "C0AEECDD-BBD0-4042-8A47-D66670A6DC6E" + "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*", + "matchCriteriaId": "875D8BED-E54F-4C54-9071-A3BAAF4493A5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*", - "matchCriteriaId": "91A3E58F-E2FE-4346-9083-58C963171A73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*", - "matchCriteriaId": "6BE07062-6299-4371-BD74-BA7F7840DBA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", - "matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E" + "criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:*:*:*:macos:*:*", + "matchCriteriaId": "DB814642-71A7-4537-9476-A0D5E0BE96DB" } ] } @@ -143,26 +155,42 @@ "references": [ { "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=859", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securitytracker.com/id?1023698", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.us-cert.gov/cas/techalerts/TA10-068A.html", "source": "secure@microsoft.com", "tags": [ + "Third Party Advisory", "US Government Resource" ] }, { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-017", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8545", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-45xx/CVE-2010-4577.json b/CVE-2010/CVE-2010-45xx/CVE-2010-4577.json index 9eac462c71a..fc386912e5f 100644 --- a/CVE-2010/CVE-2010-45xx/CVE-2010-4577.json +++ b/CVE-2010/CVE-2010-45xx/CVE-2010-4577.json @@ -2,7 +2,7 @@ "id": "CVE-2010-4577", "sourceIdentifier": "cve@mitre.org", "published": "2010-12-22T01:00:03.157", - "lastModified": "2020-07-31T18:39:45.817", + "lastModified": "2024-02-02T02:39:54.147", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -49,6 +71,10 @@ { "lang": "en", "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-843" } ] } @@ -124,21 +150,38 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Vendor Advisory" + "Issue Tracking", + "Mailing List" ] }, { "url": "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html", "source": "cve@mitre.org", "tags": [ - "Vendor Advisory" + "Release Notes" ] }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html", "source": "cve@mitre.org", "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42648", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/43086", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -146,22 +189,23 @@ "url": "http://trac.webkit.org/changeset/72685", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Mailing List", + "Patch" ] }, { "url": "http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp", "source": "cve@mitre.org", "tags": [ - "Patch", - "Third Party Advisory" + "Mailing List", + "Patch" ] }, { "url": "http://www.debian.org/security/2011/dsa-2188", "source": "cve@mitre.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, @@ -176,6 +220,7 @@ "url": "http://www.redhat.com/support/errata/RHSA-2011-0177.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -183,6 +228,7 @@ "url": "http://www.securityfocus.com/bid/45722", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -191,6 +237,7 @@ "url": "http://www.vupen.com/english/advisories/2011/0216", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] }, @@ -213,6 +260,7 @@ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory" ] } diff --git a/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json b/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json index 29972f28fa6..d1ce22d46e5 100644 --- a/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json +++ b/CVE-2011/CVE-2011-06xx/CVE-2011-0611.json @@ -2,8 +2,8 @@ "id": "CVE-2011-0611", "sourceIdentifier": "psirt@adobe.com", "published": "2011-04-13T14:55:01.217", - "lastModified": "2018-10-30T16:26:24.687", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:39:19.227", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2022-03-03", "cisaActionDue": "2022-03-24", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", @@ -19,6 +19,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -52,7 +74,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-843" } ] } @@ -68,398 +90,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "10.2.154.25", - "matchCriteriaId": "1296C04C-EB49-47C5-BCF8-B56D647DF47F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", - "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", - "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", - "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", - "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", - "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", - "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", - "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", - "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", - "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", - "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", - "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", - "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", - "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", - "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", - "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", - "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", - "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", - "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", - "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", - "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", - "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", - "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", - "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", - "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", - "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", - "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB" + "versionEndExcluding": "10.2.154.27", + "matchCriteriaId": "FE4E1BEC-9158-405E-BCD1-0D354FFFC141" } ] }, @@ -469,23 +101,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*", - "matchCriteriaId": "05924C67-F9A0-450E-A5B8-059651DD32E3" + "criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796" } ] } @@ -503,31 +135,6 @@ "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "versionEndIncluding": "10.2.156.12", "matchCriteriaId": "46059035-6EA4-4D6F-800C-CEB9D394B933" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", - "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", - "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", - "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", - "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210" } ] }, @@ -537,8 +144,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C" + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" } ] } @@ -553,183 +160,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.4.4", + "matchCriteriaId": "E3A97142-27DF-46DD-9708-1CA202B7565C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndIncluding": "10.0.1", + "matchCriteriaId": "43ADEFB3-9252-48C1-A6D5-BD2EE48A0E56" } ] }, @@ -739,20 +180,14 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -761,48 +196,163 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.6", - "matchCriteriaId": "33ABCBAC-BFDC-4086-BD49-61D13B8CF717" + "versionEndExcluding": "2.6.19140", + "matchCriteriaId": "1A80E525-2533-4598-8EB5-60A73D2F9253" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.4.4", + "matchCriteriaId": "E3A97142-27DF-46DD-9708-1CA202B7565C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90" + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndExcluding": "10.0.3", + "matchCriteriaId": "595EBFC6-533E-4D91-B84D-D16A27E1BD0A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.4", + "matchCriteriaId": "EAC4A665-19CA-495D-A00F-6B42EA627E0F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A" + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0", + "versionEndExcluding": "10.0.3", + "matchCriteriaId": "705D34AF-DF94-4834-AE15-0E31E78AF60C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.648.205", + "matchCriteriaId": "2A4680B8-AC49-4E3C-8642-31BF8A60A327" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6" + "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8" + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", + "matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08" + "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", + "matchCriteriaId": "60FBDD82-691C-4D9D-B71B-F9AFF6931B53" } ] } @@ -812,36 +362,92 @@ "references": [ { "url": "http://blogs.technet.com/b/mmpc/archive/2011/04/12/analysis-of-the-cve-2011-0611-adobe-flash-player-vulnerability-exploitation.aspx", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://bugix-security.blogspot.com/2011/04/cve-2011-0611-adobe-flash-zero-day.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Exploit" + ] }, { "url": "http://contagiodump.blogspot.com/2011/04/apr-8-cve-2011-0611-flash-player-zero.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Release Notes" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00004.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Mailing List", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/44119", + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/44141", + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/44149", + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/blog/210/", + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://securityreason.com/securityalert/8204", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securityreason.com/securityalert/8292", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.adobe.com/support/security/advisories/apsa11-02.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -849,21 +455,33 @@ "url": "http://www.adobe.com/support/security/bulletins/apsb11-07.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.adobe.com/support/security/bulletins/apsb11-08.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "http://www.exploit-db.com/exploits/17175", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kb.cert.org/vuls/id/230057", "source": "psirt@adobe.com", "tags": [ + "Broken Link", + "Third Party Advisory", "US Government Resource" ] }, @@ -871,25 +489,42 @@ "url": "http://www.redhat.com/support/errata/RHSA-2011-0451.html", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/47314", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1025324", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id?1025325", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2011/0922", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -897,6 +532,7 @@ "url": "http://www.vupen.com/english/advisories/2011/0923", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -904,16 +540,24 @@ "url": "http://www.vupen.com/english/advisories/2011/0924", "source": "psirt@adobe.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66681", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14175", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json b/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json index e227ae887f4..b27f529d777 100644 --- a/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json +++ b/CVE-2015/CVE-2015-36xx/CVE-2015-3629.json @@ -2,8 +2,8 @@ "id": "CVE-2015-3629", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-18T15:59:15.807", - "lastModified": "2023-11-07T02:25:39.753", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:07:17.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -68,28 +90,63 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", + "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081" + } + ] + } + ] } ], "references": [ { "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://seclists.org/fulldisclosure/2015/May/28", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/74558", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-107xx/CVE-2019-10743.json b/CVE-2019/CVE-2019-107xx/CVE-2019-10743.json index aa2943fa3cf..d9584bef512 100644 --- a/CVE-2019/CVE-2019-107xx/CVE-2019-10743.json +++ b/CVE-2019/CVE-2019-107xx/CVE-2019-10743.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10743", "sourceIdentifier": "report@snyk.io", "published": "2019-10-29T19:15:16.610", - "lastModified": "2023-11-07T03:02:32.897", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:13:35.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -86,7 +86,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:archiver_project:archiver:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.0.0", - "matchCriteriaId": "6034FCAA-1357-4BF8-BD00-0D79BBB49149" + "versionEndExcluding": "3.3.2", + "matchCriteriaId": "AB7F38AB-45A4-4A40-B7B7-27BB0EDCC299" } ] } @@ -98,7 +99,7 @@ "url": "https://github.com/mholt/archiver/pull/169", "source": "report@snyk.io", "tags": [ - "Third Party Advisory" + "Issue Tracking" ] }, { @@ -110,7 +111,7 @@ }, { "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728", - "source": "report@snyk.io", + "source": "nvd@nist.gov", "tags": [ "Exploit", "Third Party Advisory" @@ -118,7 +119,10 @@ }, { "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728%2C", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json b/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json index 373ab974d89..cb1acb32232 100644 --- a/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json +++ b/CVE-2022/CVE-2022-26xx/CVE-2022-2639.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2639", "sourceIdentifier": "secalert@redhat.com", "published": "2022-09-01T21:15:09.600", - "lastModified": "2023-11-07T03:46:47.957", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:36:25.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,7 +50,7 @@ ] }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { @@ -170,8 +170,7 @@ "source": "secalert@redhat.com", "tags": [ "Exploit", - "Patch", - "Third Party Advisory" + "Patch" ] } ] diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json index cf7ac6bdadb..c2d6d5c316a 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29055.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29055", "sourceIdentifier": "security@apache.org", "published": "2024-01-29T13:15:07.970", - "lastModified": "2024-01-29T15:15:08.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:06:07.107", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,7 +14,30 @@ "value": "En Apache Kylin versi\u00f3n 2.0.0 a 4.0.3, hay una interfaz web de configuraci\u00f3n de servidor que muestra el contenido del archivo 'kylin.properties', que puede contener credenciales del lado del servidor. Cuando el servicio kylin se ejecuta a trav\u00e9s de HTTP (u otro protocolo de texto plano), es posible que los rastreadores de red secuestren el payload HTTP y obtengan acceso al contenido de kylin.properties y potencialmente a las credenciales que lo contienen. Para evitar esta amenaza, se recomienda a los usuarios * activar siempre HTTPS para que el payload de la red est\u00e9 cifrado. * Evite poner credenciales en kylin.properties, o al menos no en texto plano. * Utilice firewalls de red para proteger el lado del servidor de modo que no sea accesible para atacantes externos. * Actualice a la versi\u00f3n Apache Kylin 4.0.4, que filtra el contenido confidencial que va a la interfaz web de Server Config." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -27,14 +50,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "4.0.4", + "matchCriteriaId": "6108FC48-5A83-486C-B698-7D42F0899DFF" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/01/29/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/o1bvyv9wnfkx7dxpfjlor20nykgsoh6r", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json new file mode 100644 index 00000000000..e6772b06f29 --- /dev/null +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32333.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-32333", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:16.323", + "lastModified": "2024-02-02T02:15:16.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Maximo Asset Management 7.6.1.3 could allow a remote attacker to log into the admin panel due to improper access controls. IBM X-Force ID: 255073." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255073", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7112388", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json index 40a061583e8..479237f89a2 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36496", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-02-01T23:15:09.107", - "lastModified": "2024-02-01T23:15:09.107", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40058.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40058.json index 774746faca0..fec76e05fb6 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40058.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40058", "sourceIdentifier": "psirt@solarwinds.com", "published": "2023-12-21T17:15:07.763", - "lastModified": "2024-01-04T14:15:39.237", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:20:45.723", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45115.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45115.json index 42b4910dedd..ccaec15f628 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45115.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45115.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45115", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-12-21T16:15:07.517", - "lastModified": "2024-01-02T14:15:08.167", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:28:37.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json new file mode 100644 index 00000000000..2b0929e80b3 --- /dev/null +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46344", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:16.537", + "lastModified": "2024-02-02T02:15:16.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://solar-log.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46706.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46706.json index 6f8c1c4b1b0..332ed1cead9 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46706.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46706.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46706", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:09.333", - "lastModified": "2024-02-01T23:15:09.333", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json index 58fb3bafb76..e535cfbc1af 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46838", "sourceIdentifier": "security@xen.org", "published": "2024-01-29T11:15:07.933", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:06:40.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,69 @@ "value": "Las solicitudes de transmisi\u00f3n en el protocolo de red virtual de Xen pueden constar de varias partes. Si bien no es realmente \u00fatil, excepto la parte inicial, cualquiera de ellos puede tener una longitud cero, es decir, no contener ning\u00fan dato. Adem\u00e1s de una cierta porci\u00f3n inicial de los datos a transferir, estas partes se traducen directamente en lo que Linux llama fragmentos SKB. Estas partes de solicitud convertidas pueden, cuando para un SKB en particular todas tienen longitud cero, provocar una desreferencia de NULL en el c\u00f3digo de red central." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14", + "versionEndExcluding": "6.7", + "matchCriteriaId": "CD62E8EA-4051-4EB9-AE74-F2A7B7F8FE13" + } + ] + } + ] + } + ], "references": [ { "url": "https://xenbits.xenproject.org/xsa/advisory-448.html", - "source": "security@xen.org" + "source": "security@xen.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47867.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47867.json index 6adce67fbd5..a489ba8581b 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47867.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47867.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47867", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:09.567", - "lastModified": "2024-02-01T23:15:09.567", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json new file mode 100644 index 00000000000..5cb488ec637 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-48792", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:16.590", + "lastModified": "2024-02-02T02:15:16.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Zoho ManageEngine ADAudit Plus through 7250 is vulnerable to SQL Injection in the report export option." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://manageengine.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json new file mode 100644 index 00000000000..0bd881b0989 --- /dev/null +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-48793", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:16.637", + "lastModified": "2024-02-02T02:15:16.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Zoho ManageEngine ADAudit Plus through 7250 allows SQL Injection in the aggregate report feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://manageengine.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49115.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49115.json index 7c4ba18962d..7a2055b9051 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49115.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49115.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49115", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:09.773", - "lastModified": "2024-02-01T23:15:09.773", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49610.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49610.json index 4c14c1208f2..a870a2e977b 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49610.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49610.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49610", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:10.003", - "lastModified": "2024-02-01T23:15:10.003", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49617.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49617.json index ba4147d00c3..2d781dc0fab 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49617.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49617.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49617", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:10.227", - "lastModified": "2024-02-01T23:15:10.227", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50326.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50326.json new file mode 100644 index 00000000000..c7948ff76c4 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50326.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50326", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T01:15:07.710", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 275107.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275107", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50327.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50327.json new file mode 100644 index 00000000000..fce7ded2e0c --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50327.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50327", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T01:15:07.937", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which could allow a remote attacker to perform unauthorized file request modification. IBM X-Force ID: 275109.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-650" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275109", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json new file mode 100644 index 00000000000..95b55c94fc1 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50328.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50328", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:16.683", + "lastModified": "2024-02-02T02:15:16.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 may allow a remote attacker to view session identifiers passed via URL query strings. IBM X-Force ID: 275110.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275110", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50933.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50933.json new file mode 100644 index 00000000000..a52926b8e4a --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50933.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-50933", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T01:15:08.140", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 275113.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275113", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json new file mode 100644 index 00000000000..d1cbd1d0936 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50934.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50934", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:16.890", + "lastModified": "2024-02-02T02:15:16.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 uses single-factor authentication which can lead to unnecessary risk of compromise when compared with the benefits of a dual-factor authentication scheme. IBM X-Force ID: 275114.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-308" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275114", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json new file mode 100644 index 00000000000..1f7fe160cc4 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50935.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50935", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:17.087", + "lastModified": "2024-02-02T02:15:17.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict access to a URL or resource, which may allow a remote attacker to obtain unauthorized access to application functionality and/or resources. IBM X-Force ID: 275115.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-425" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275115", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50936.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50936.json new file mode 100644 index 00000000000..a570b575e5b --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50936.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50936", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T01:15:08.310", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 275116.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275116", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50937.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50937.json new file mode 100644 index 00000000000..c06f43b125a --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50937.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50937", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T01:15:08.520", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 275117.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275117", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json new file mode 100644 index 00000000000..b2ce7ef0502 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50938.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50938", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:17.277", + "lastModified": "2024-02-02T02:15:17.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 275128.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275128", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50939.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50939.json index b3ca47f69dd..0673ad2f890 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50939.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50939.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50939", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T00:15:54.540", - "lastModified": "2024-02-02T00:15:54.540", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50940.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50940.json new file mode 100644 index 00000000000..3318e67489e --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50940.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50940", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T01:15:08.753", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 275130.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-942" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275130", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json new file mode 100644 index 00000000000..a205e37c3a9 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50941.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50941", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:17.467", + "lastModified": "2024-02-02T02:15:17.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 does not provide logout functionality, which could allow an authenticated user to gain access to an unauthorized user using session fixation. IBM X-Force ID: 275131.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275131", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json new file mode 100644 index 00000000000..f5e8f15ca25 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50962.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50962", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-02T02:15:17.667", + "lastModified": "2024-02-02T02:15:17.667", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerSC 1.3, 2.0, and 2.1 MFA does not implement the \"HTTP Strict Transport Security\" (HSTS) web security policy mechanism. IBM X-Force ID: 276004.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/276004", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7113759", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json index c973ed94f0b..9a74705b477 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51443", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-27T17:15:08.093", - "lastModified": "2024-01-08T16:15:46.677", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:23:51.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 5.9, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.2, "impactScore": 3.6 }, { @@ -91,7 +91,12 @@ "references": [ { "url": "http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json index 4767d6cc3c9..3552370b915 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51766", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T06:15:07.673", - "lastModified": "2024-01-18T03:15:58.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-02T02:22:45.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 4.3, + "baseScore": 5.3, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 1.4 } ] @@ -101,6 +101,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -207,19 +222,34 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lwn.net/Articles/956533/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/", @@ -240,7 +270,10 @@ }, { "url": "https://www.youtube.com/watch?v=V8KPV96g1To", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json index e708290f8c9..6d9a39c2cad 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5378.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5378", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-29T12:15:07.860", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:06:20.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -50,22 +80,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:megabip:megabip:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.36.2", + "matchCriteriaId": "A61E360F-A37C-4E94-AA77-340F36667E38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smod:smodbip:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.21", + "matchCriteriaId": "E866378A-BD50-4001-9F9F-190B09F9DEAE" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2023/12/CVE-2023-5378", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2023/12/CVE-2023-5378", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://megabip.pl/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://smod.pl/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6221.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6221.json index 892adb6fedf..115690f2343 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6221.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6221.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6221", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:10.510", - "lastModified": "2024-02-01T23:15:10.510", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6856.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6856.json index d8e2c7307d1..3df11e6f74d 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6856.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6856.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6856", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.313", - "lastModified": "2024-01-07T11:15:14.967", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:31:59.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -111,15 +116,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6857.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6857.json index 90336f256a9..64134df0a95 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6857.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6857.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6857", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.377", - "lastModified": "2024-01-07T11:15:15.063", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:32:05.747", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -107,6 +107,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -133,15 +138,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6858.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6858.json index 2b525ab2425..dc7702fc8b2 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6858.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6858.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6858", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.420", - "lastModified": "2024-01-07T11:15:15.150", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:32:17.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -111,15 +116,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6859.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6859.json index 46300f5f4de..a6d7597b0ae 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6859.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6859.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6859", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.467", - "lastModified": "2024-01-07T11:15:15.240", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:32:22.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -111,15 +116,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6860.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6860.json index 088a073f0b1..fd0201993a0 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6860.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6860.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6860", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.510", - "lastModified": "2024-01-07T11:15:15.317", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:32:26.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -111,15 +116,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6861.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6861.json index 0e4e3ec8af8..aff091fb007 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6861.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6861.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6861", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.560", - "lastModified": "2024-01-07T11:15:15.410", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:41:33.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -111,15 +116,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6862.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6862.json index eaa1d86c51e..7cdd9839025 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6862.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6862.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6862", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.603", - "lastModified": "2024-01-07T11:15:15.487", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:42:37.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,6 +79,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -105,15 +110,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6863.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6863.json index d56918f77a5..2ca0b5302de 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6863.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6863.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6863", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.650", - "lastModified": "2024-01-07T11:15:15.567", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:35:16.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -110,11 +115,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6864.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6864.json index 420431226f1..d54522efb6d 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6864.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6864.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6864", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.707", - "lastModified": "2024-01-07T11:15:15.660", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:43:04.313", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -105,20 +110,32 @@ "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015", "source": "security@mozilla.org", "tags": [ - "Broken Link" + "Broken Link", + "Issue Tracking" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6865.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6865.json index b4f718b76f9..ac8dec24865 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6865.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6865.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6865", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.777", - "lastModified": "2024-01-07T11:15:15.740", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:35:21.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,6 +79,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -105,11 +110,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json index 7a57694e117..5789dcc03f5 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6866.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6866", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.847", - "lastModified": "2024-01-07T11:15:15.853", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:35:26.300", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,7 +79,10 @@ }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6867.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6867.json index 29cf3ec0fa5..a85cfce3c45 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6867.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6867.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6867", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.933", - "lastModified": "2024-01-07T11:15:15.940", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:35:33.273", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,6 +79,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -105,11 +110,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5581", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6868.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6868.json index aeef50458cc..5a28016a39f 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6868.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6868.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6868", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:07.983", - "lastModified": "2024-01-07T11:15:16.030", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:28:41.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -91,7 +91,10 @@ }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6869.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6869.json index 665705407a1..48a7633592a 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6869.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6869.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6869", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:08.040", - "lastModified": "2024-01-07T11:15:16.117", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:29:05.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,7 +79,10 @@ }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6870.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6870.json index e98d607d121..ce1ede6630f 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6870.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6870.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6870", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:08.087", - "lastModified": "2024-01-07T11:15:16.200", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:29:09.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -96,7 +96,10 @@ }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6871.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6871.json index ec66bf0b2f3..20eee5ee5f7 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6871.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6871", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:08.133", - "lastModified": "2024-01-07T11:15:16.287", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:29:14.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,7 +79,10 @@ }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6872.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6872.json index 742506ee5aa..da31d71fae3 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6872.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6872.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6872", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:08.180", - "lastModified": "2024-01-07T11:15:16.370", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:29:18.200", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,7 +79,10 @@ }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6873.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6873.json index 50c1c09500f..786f4627e37 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6873.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6873.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6873", "sourceIdentifier": "security@mozilla.org", "published": "2023-12-19T14:15:08.227", - "lastModified": "2024-01-07T11:15:16.447", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:29:27.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -73,6 +73,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -99,11 +104,18 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202401-10", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5582", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json index bf303f0f623..1265f5757cb 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6879", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-12-27T23:15:07.530", - "lastModified": "2024-01-07T02:15:43.893", - "vulnStatus": "Modified", + "lastModified": "2024-02-02T02:27:15.863", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,6 +103,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", @@ -134,13 +139,18 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/", "source": "cve-coordination@google.com", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0212.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0212.json index 79a833d55e3..559d9a66b13 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0212.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0212", "sourceIdentifier": "cna@cloudflare.com", "published": "2024-01-29T10:15:08.013", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:08:12.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -50,14 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudflare:cloudflare:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.12.3", + "matchCriteriaId": "F39EFAFE-8F19-4A04-8AED-E540A7245052" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cloudflare/Cloudflare-WordPress/releases/tag/v4.12.3", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/cloudflare/Cloudflare-WordPress/security/advisories/GHSA-h2fj-7r3m-7gf2", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json index 7057e2aa88a..ec168ac7152 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0470", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T21:15:10.800", - "lastModified": "2024-01-17T18:27:01.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-02T02:47:35.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,8 +104,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fabianros:human_resource_integrated_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97ADC395-708B-46E6-9FDB-B97645F44831" + "criteria": "cpe:2.3:a:code-projects:human_resource_integrated_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5938CA79-F046-4802-A059-D3CADDB7680B" } ] } diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json index 98e9a13eb34..99704ba0675 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0471", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T21:15:11.050", - "lastModified": "2024-01-17T18:27:15.440", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-02T02:48:16.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,8 +104,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fabianros:human_resource_integrated_system:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "97ADC395-708B-46E6-9FDB-B97645F44831" + "criteria": "cpe:2.3:a:code-projects:human_resource_integrated_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5938CA79-F046-4802-A059-D3CADDB7680B" } ] } diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0958.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0958.json index b3b938f29be..cbf18c1edb1 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0958.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0958.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0958", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-27T06:15:48.183", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:20:21.333", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -64,6 +84,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,18 +105,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:swapnilsahu:stock_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "85E733C8-F179-4B75-862D-53A6E4CAD5BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252203", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252203", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0959.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0959.json index e4ba0b82d30..238f26cbf23 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0959.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0959.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0959", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-27T11:15:17.497", - "lastModified": "2024-01-29T14:25:30.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:18:46.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,22 +95,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:standford:gibsonenv:0.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "503F6932-307F-4752-8F90-560D57914948" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/bayuncao/vul-cve-7/blob/main/dataset.pkl", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.252204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.252204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json index 5d7b888cc5e..700c5b051cf 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0960", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-27T12:15:07.903", - "lastModified": "2024-01-29T14:25:25.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:19:05.557", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,22 +95,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flink-extended:aiflow:0.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6EFEAE6F-9E53-49DC-B8E0-F7EA7EE20080" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/bayuncao/vul-cve-8/blob/main/dataset.pkl", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.252205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.252205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json index 023d5e1248d..e779f70dafd 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0962", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-27T13:15:07.973", - "lastModified": "2024-01-29T14:25:25.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:19:44.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -65,8 +85,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -75,26 +105,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libcoap:libcoap:4.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "6015782B-1A2E-4F55-BA3F-D40FDAFAD2CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/obgm/libcoap/issues/1310", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Patch" + ] }, { "url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/obgm/libcoap/pull/1311", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.252206", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.252206", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json index c4dd1d4516b..1a8087f4d29 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1014", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-29T14:15:09.437", - "lastModified": "2024-01-30T09:15:48.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:05:39.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -40,7 +60,7 @@ }, "weaknesses": [ { - "source": "cve-coordination@incibe.es", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -48,16 +68,62 @@ "value": "CWE-400" } ] + }, + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:se-elektronicgmbh:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB32F1D-8E3D-4C2F-BF31-A107C9963D25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E" + } + ] + } + ] } ], "references": [ { "url": "https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-se-elektronic-gmbh-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json index 0091a48dfdf..c409e3e6746 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1015", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-29T14:15:09.657", - "lastModified": "2024-01-30T09:15:48.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:04:13.267", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -40,7 +60,7 @@ }, "weaknesses": [ { - "source": "cve-coordination@incibe.es", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -48,16 +68,61 @@ "value": "CWE-94" } ] + }, + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:se-elektronicgmbh:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB32F1D-8E3D-4C2F-BF31-A107C9963D25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E" + } + ] + } + ] } ], "references": [ { "url": "https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-se-elektronic-gmbh-products", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json new file mode 100644 index 00000000000..13454fcad90 --- /dev/null +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21399.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-21399", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-02-02T01:15:08.970", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21399", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21764.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21764.json index 89623952241..4ff57a059cf 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21764.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21764", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-02T00:15:54.767", - "lastModified": "2024-02-02T00:15:54.767", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21794.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21794.json index dee0cdb13bb..b3c4165c009 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21794.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21794", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-02T00:15:54.953", - "lastModified": "2024-02-02T00:15:54.953", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21852.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21852.json index a389dc92823..62766ea571b 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21852.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21852", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T23:15:10.730", - "lastModified": "2024-02-01T23:15:10.730", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:58:03.307", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21866.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21866.json index 7703050a9a5..2b95ede29e3 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21866.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21866", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-02T00:15:55.143", - "lastModified": "2024-02-02T00:15:55.143", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21869.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21869.json index 38003de18f2..9ac91a98a10 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21869.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21869.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21869", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-02T00:15:55.340", - "lastModified": "2024-02-02T00:15:55.340", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22016.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22016.json index a64ddb69050..b9454891cc7 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22016.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22016", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-02T00:15:55.533", - "lastModified": "2024-02-02T00:15:55.533", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22096.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22096.json index a3b6f59eb33..a198fe5617b 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22096.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22096", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-02T00:15:55.713", - "lastModified": "2024-02-02T00:15:55.713", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22559.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22559.json index d3e7770158d..caf4970911d 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22559.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22559.json @@ -2,19 +2,80 @@ "id": "CVE-2024-22559", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-29T14:15:09.940", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:03:48.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "LightCMS v2.0 is vulnerable to Cross Site Scripting (XSS) in the Content Management - Articles field." + }, + { + "lang": "es", + "value": "LightCMS v2.0 es vulnerable a Cross Site Scripting (XSS) en el campo Content Management - Articles." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lightcms_project:lightcms:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "188FCA72-D81E-48AA-8C49-58CB4BCD877F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/eddy8/LightCMS/issues/34", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json new file mode 100644 index 00000000000..8ad457bb52b --- /dev/null +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22779.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-22779", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:17.890", + "lastModified": "2024-02-02T02:15:17.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in Kihron ServerRPExposer v.1.0.2 and before allows a remote attacker to execute arbitrary code via the loadServerPack in ServerResourcePackProviderMixin.java." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Kihron/ServerRPExposer/commit/8f7b829df633f59e828d677f736c53652d6f1b8f", + "source": "cve@mitre.org" + }, + { + "url": "https://modrinth.com/mod/serverrpexposer", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json new file mode 100644 index 00000000000..054afb8d0c8 --- /dev/null +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22899.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-22899", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:18.073", + "lastModified": "2024-02-02T02:15:18.073", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://vinchin.com", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/29", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json new file mode 100644 index 00000000000..6384470b4c6 --- /dev/null +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22900.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-22900", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:18.127", + "lastModified": "2024-02-02T02:15:18.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the setNetworkCardInfo function." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://vinchin.com", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/29", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json new file mode 100644 index 00000000000..77c8c293eb6 --- /dev/null +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22901.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-22901", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:18.177", + "lastModified": "2024-02-02T02:15:18.177", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://vinchin.com", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/30", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json new file mode 100644 index 00000000000..03ff1af4681 --- /dev/null +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22902.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-22902", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:18.223", + "lastModified": "2024-02-02T02:15:18.223", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vinchin Backup & Recovery v7.2 was discovered to be configured with default root credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://default.com", + "source": "cve@mitre.org" + }, + { + "url": "http://vinchin.com", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/31", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json new file mode 100644 index 00000000000..256b286bf01 --- /dev/null +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22903.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-22903", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:18.277", + "lastModified": "2024-02-02T02:15:18.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the deleteUpdateAPK function." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://vinchin.com", + "source": "cve@mitre.org" + }, + { + "url": "https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/", + "source": "cve@mitre.org" + }, + { + "url": "https://seclists.org/fulldisclosure/2024/Jan/32", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-229xx/CVE-2024-22927.json b/CVE-2024/CVE-2024-229xx/CVE-2024-22927.json index 856b38c6a58..b82fe0ff93f 100644 --- a/CVE-2024/CVE-2024-229xx/CVE-2024-22927.json +++ b/CVE-2024/CVE-2024-229xx/CVE-2024-22927.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22927", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T23:15:10.960", - "lastModified": "2024-02-01T23:15:10.960", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23031.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23031.json index 834b03f4229..25da642020e 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23031.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23031.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23031", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T23:15:11.020", - "lastModified": "2024-02-01T23:15:11.020", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23032.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23032.json index 763a84f0b8f..37ebacc428a 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23032.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23032", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T23:15:11.067", - "lastModified": "2024-02-01T23:15:11.067", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23033.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23033.json index 81b1be6a9d8..8a435ff6f5e 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23033.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23033", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T23:15:11.113", - "lastModified": "2024-02-01T23:15:11.113", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23034.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23034.json index a6660c8f6ef..c67af38887e 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23034.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23034", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-01T23:15:11.160", - "lastModified": "2024-02-01T23:15:11.160", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json new file mode 100644 index 00000000000..6558d9ec849 --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23746.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-23746", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-02T02:15:18.330", + "lastModified": "2024-02-02T02:15:18.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Miro Desktop 0.8.18 on macOS allows Electron code injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-electron-applications-injection", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/louiselalanne/CVE-2024-23746", + "source": "cve@mitre.org" + }, + { + "url": "https://miro.com/about/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23747.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23747.json index e62ae48b1a3..6db79efea54 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23747.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23747.json @@ -2,23 +2,86 @@ "id": "CVE-2024-23747", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-29T14:15:09.993", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:03:39.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability. This vulnerability resides in the system's handling of user data access through a /Modernanet/LAUDO/LAU0000100/Laudo?id= URI. By manipulating this id parameter, an attacker can gain access to sensitive medical information." + }, + { + "lang": "es", + "value": "Moderna Sistemas ModernaNet Hospital Management System 2024 es susceptible a una vulnerabilidad de referencia directa a objetos inseguros (IDOR). Esta vulnerabilidad reside en el manejo por parte del sistema del acceso a los datos del usuario a trav\u00e9s de un /Modernanet/LAUDO/LAU0000100/Laudo?id= URI. Al manipular este par\u00e1metro de id, un atacante puede obtener acceso a informaci\u00f3n m\u00e9dica confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:modernasistemas:modernanet_hospital_management_system_2024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5E44BF84-A17C-4340-B075-41867E40AE0D" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/louiselalanne/CVE-2024-23747", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://modernasistemas.com.br/sitems/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23790.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23790.json index aa4d16a9bce..9fb3091ad5d 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23790.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23790", "sourceIdentifier": "security@otrs.com", "published": "2024-01-29T10:15:08.263", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:07:58.653", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@otrs.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] + }, { "source": "security@otrs.com", "type": "Secondary", @@ -50,10 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.49", + "matchCriteriaId": "4E47E75A-C9A9-40EE-A5DE-B4CDD98E7B7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "2024.1.1", + "matchCriteriaId": "3B9B2075-4C3E-48C9-96DA-655E4F29325A" + } + ] + } + ] + } + ], "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-01/", - "source": "security@otrs.com" + "source": "security@otrs.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23791.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23791.json index d6e1109daf4..6ed503e6447 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23791.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23791", "sourceIdentifier": "security@otrs.com", "published": "2024-01-29T10:15:08.483", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:07:28.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@otrs.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "security@otrs.com", "type": "Secondary", @@ -50,10 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.49", + "matchCriteriaId": "4E47E75A-C9A9-40EE-A5DE-B4CDD98E7B7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "2024.1.1", + "matchCriteriaId": "3B9B2075-4C3E-48C9-96DA-655E4F29325A" + } + ] + } + ] + } + ], "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-02/", - "source": "security@otrs.com" + "source": "security@otrs.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23792.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23792.json index a585d097666..058b7cae71a 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23792.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23792", "sourceIdentifier": "security@otrs.com", "published": "2024-01-29T10:15:08.683", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:07:40.577", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@otrs.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "security@otrs.com", "type": "Secondary", @@ -50,10 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.49", + "matchCriteriaId": "4E47E75A-C9A9-40EE-A5DE-B4CDD98E7B7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "2024.1.1", + "matchCriteriaId": "3B9B2075-4C3E-48C9-96DA-655E4F29325A" + } + ] + } + ] + } + ], "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-03/", - "source": "security@otrs.com" + "source": "security@otrs.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24736.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24736.json index aceef920a0c..215ee24f810 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24736.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24736", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-29T04:15:07.637", - "lastModified": "2024-01-29T14:25:21.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-02T02:08:23.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,68 @@ "value": "El servicio POP3 en YahooPOPs (tambi\u00e9n conocido como YPOPs!) 1.6 permite una denegaci\u00f3n remota de servicio (reboot) a trav\u00e9s de una larga cadena al puerto TCP 110, un problema relacionado con CVE-2004-1558." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ypopsemail:ypops\\!:1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "58F56C4B-2682-4AFB-B993-9FDB5A95F953" + } + ] + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json index 445b0827092..d9e26df295b 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24756", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T23:15:11.210", - "lastModified": "2024-02-01T23:15:11.210", - "vulnStatus": "Received", + "lastModified": "2024-02-02T01:57:57.640", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index b3754616337..169846c2d2b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-02T00:55:33.314334+00:00 +2024-02-02T03:00:57.302409+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-02T00:15:55.713000+00:00 +2024-02-02T02:59:48.153000+00:00 ``` ### Last Data Feed Release @@ -23,46 +23,74 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-02-01T01:00:28.264705+00:00 +2024-02-02T01:00:28.264434+00:00 ``` ### Total Number of included CVEs ```plain -237347 +237371 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `24` -* [CVE-2023-36496](CVE-2023/CVE-2023-364xx/CVE-2023-36496.json) (`2024-02-01T23:15:09.107`) -* [CVE-2023-46706](CVE-2023/CVE-2023-467xx/CVE-2023-46706.json) (`2024-02-01T23:15:09.333`) -* [CVE-2023-47867](CVE-2023/CVE-2023-478xx/CVE-2023-47867.json) (`2024-02-01T23:15:09.567`) -* [CVE-2023-49115](CVE-2023/CVE-2023-491xx/CVE-2023-49115.json) (`2024-02-01T23:15:09.773`) -* [CVE-2023-49610](CVE-2023/CVE-2023-496xx/CVE-2023-49610.json) (`2024-02-01T23:15:10.003`) -* [CVE-2023-49617](CVE-2023/CVE-2023-496xx/CVE-2023-49617.json) (`2024-02-01T23:15:10.227`) -* [CVE-2023-6221](CVE-2023/CVE-2023-62xx/CVE-2023-6221.json) (`2024-02-01T23:15:10.510`) -* [CVE-2023-50939](CVE-2023/CVE-2023-509xx/CVE-2023-50939.json) (`2024-02-02T00:15:54.540`) -* [CVE-2024-21852](CVE-2024/CVE-2024-218xx/CVE-2024-21852.json) (`2024-02-01T23:15:10.730`) -* [CVE-2024-22927](CVE-2024/CVE-2024-229xx/CVE-2024-22927.json) (`2024-02-01T23:15:10.960`) -* [CVE-2024-23031](CVE-2024/CVE-2024-230xx/CVE-2024-23031.json) (`2024-02-01T23:15:11.020`) -* [CVE-2024-23032](CVE-2024/CVE-2024-230xx/CVE-2024-23032.json) (`2024-02-01T23:15:11.067`) -* [CVE-2024-23033](CVE-2024/CVE-2024-230xx/CVE-2024-23033.json) (`2024-02-01T23:15:11.113`) -* [CVE-2024-23034](CVE-2024/CVE-2024-230xx/CVE-2024-23034.json) (`2024-02-01T23:15:11.160`) -* [CVE-2024-24756](CVE-2024/CVE-2024-247xx/CVE-2024-24756.json) (`2024-02-01T23:15:11.210`) -* [CVE-2024-21764](CVE-2024/CVE-2024-217xx/CVE-2024-21764.json) (`2024-02-02T00:15:54.767`) -* [CVE-2024-21794](CVE-2024/CVE-2024-217xx/CVE-2024-21794.json) (`2024-02-02T00:15:54.953`) -* [CVE-2024-21866](CVE-2024/CVE-2024-218xx/CVE-2024-21866.json) (`2024-02-02T00:15:55.143`) -* [CVE-2024-21869](CVE-2024/CVE-2024-218xx/CVE-2024-21869.json) (`2024-02-02T00:15:55.340`) -* [CVE-2024-22016](CVE-2024/CVE-2024-220xx/CVE-2024-22016.json) (`2024-02-02T00:15:55.533`) -* [CVE-2024-22096](CVE-2024/CVE-2024-220xx/CVE-2024-22096.json) (`2024-02-02T00:15:55.713`) +* [CVE-2023-50326](CVE-2023/CVE-2023-503xx/CVE-2023-50326.json) (`2024-02-02T01:15:07.710`) +* [CVE-2023-50327](CVE-2023/CVE-2023-503xx/CVE-2023-50327.json) (`2024-02-02T01:15:07.937`) +* [CVE-2023-50933](CVE-2023/CVE-2023-509xx/CVE-2023-50933.json) (`2024-02-02T01:15:08.140`) +* [CVE-2023-50936](CVE-2023/CVE-2023-509xx/CVE-2023-50936.json) (`2024-02-02T01:15:08.310`) +* [CVE-2023-50937](CVE-2023/CVE-2023-509xx/CVE-2023-50937.json) (`2024-02-02T01:15:08.520`) +* [CVE-2023-50940](CVE-2023/CVE-2023-509xx/CVE-2023-50940.json) (`2024-02-02T01:15:08.753`) +* [CVE-2023-32333](CVE-2023/CVE-2023-323xx/CVE-2023-32333.json) (`2024-02-02T02:15:16.323`) +* [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-02-02T02:15:16.537`) +* [CVE-2023-48792](CVE-2023/CVE-2023-487xx/CVE-2023-48792.json) (`2024-02-02T02:15:16.590`) +* [CVE-2023-48793](CVE-2023/CVE-2023-487xx/CVE-2023-48793.json) (`2024-02-02T02:15:16.637`) +* [CVE-2023-50328](CVE-2023/CVE-2023-503xx/CVE-2023-50328.json) (`2024-02-02T02:15:16.683`) +* [CVE-2023-50934](CVE-2023/CVE-2023-509xx/CVE-2023-50934.json) (`2024-02-02T02:15:16.890`) +* [CVE-2023-50935](CVE-2023/CVE-2023-509xx/CVE-2023-50935.json) (`2024-02-02T02:15:17.087`) +* [CVE-2023-50938](CVE-2023/CVE-2023-509xx/CVE-2023-50938.json) (`2024-02-02T02:15:17.277`) +* [CVE-2023-50941](CVE-2023/CVE-2023-509xx/CVE-2023-50941.json) (`2024-02-02T02:15:17.467`) +* [CVE-2023-50962](CVE-2023/CVE-2023-509xx/CVE-2023-50962.json) (`2024-02-02T02:15:17.667`) +* [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-02-02T01:15:08.970`) +* [CVE-2024-22779](CVE-2024/CVE-2024-227xx/CVE-2024-22779.json) (`2024-02-02T02:15:17.890`) +* [CVE-2024-22899](CVE-2024/CVE-2024-228xx/CVE-2024-22899.json) (`2024-02-02T02:15:18.073`) +* [CVE-2024-22900](CVE-2024/CVE-2024-229xx/CVE-2024-22900.json) (`2024-02-02T02:15:18.127`) +* [CVE-2024-22901](CVE-2024/CVE-2024-229xx/CVE-2024-22901.json) (`2024-02-02T02:15:18.177`) +* [CVE-2024-22902](CVE-2024/CVE-2024-229xx/CVE-2024-22902.json) (`2024-02-02T02:15:18.223`) +* [CVE-2024-22903](CVE-2024/CVE-2024-229xx/CVE-2024-22903.json) (`2024-02-02T02:15:18.277`) +* [CVE-2024-23746](CVE-2024/CVE-2024-237xx/CVE-2024-23746.json) (`2024-02-02T02:15:18.330`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `94` +* [CVE-2024-23033](CVE-2024/CVE-2024-230xx/CVE-2024-23033.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-23034](CVE-2024/CVE-2024-230xx/CVE-2024-23034.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-24756](CVE-2024/CVE-2024-247xx/CVE-2024-24756.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-21764](CVE-2024/CVE-2024-217xx/CVE-2024-21764.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-21794](CVE-2024/CVE-2024-217xx/CVE-2024-21794.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-21866](CVE-2024/CVE-2024-218xx/CVE-2024-21866.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-21869](CVE-2024/CVE-2024-218xx/CVE-2024-21869.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-22016](CVE-2024/CVE-2024-220xx/CVE-2024-22016.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-22096](CVE-2024/CVE-2024-220xx/CVE-2024-22096.json) (`2024-02-02T01:57:57.640`) +* [CVE-2024-21852](CVE-2024/CVE-2024-218xx/CVE-2024-21852.json) (`2024-02-02T01:58:03.307`) +* [CVE-2024-23747](CVE-2024/CVE-2024-237xx/CVE-2024-23747.json) (`2024-02-02T02:03:39.093`) +* [CVE-2024-22559](CVE-2024/CVE-2024-225xx/CVE-2024-22559.json) (`2024-02-02T02:03:48.573`) +* [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-02-02T02:04:13.267`) +* [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-02-02T02:05:39.277`) +* [CVE-2024-23791](CVE-2024/CVE-2024-237xx/CVE-2024-23791.json) (`2024-02-02T02:07:28.850`) +* [CVE-2024-23792](CVE-2024/CVE-2024-237xx/CVE-2024-23792.json) (`2024-02-02T02:07:40.577`) +* [CVE-2024-23790](CVE-2024/CVE-2024-237xx/CVE-2024-23790.json) (`2024-02-02T02:07:58.653`) +* [CVE-2024-0212](CVE-2024/CVE-2024-02xx/CVE-2024-0212.json) (`2024-02-02T02:08:12.603`) +* [CVE-2024-24736](CVE-2024/CVE-2024-247xx/CVE-2024-24736.json) (`2024-02-02T02:08:23.417`) +* [CVE-2024-0959](CVE-2024/CVE-2024-09xx/CVE-2024-0959.json) (`2024-02-02T02:18:46.160`) +* [CVE-2024-0960](CVE-2024/CVE-2024-09xx/CVE-2024-0960.json) (`2024-02-02T02:19:05.557`) +* [CVE-2024-0962](CVE-2024/CVE-2024-09xx/CVE-2024-0962.json) (`2024-02-02T02:19:44.257`) +* [CVE-2024-0958](CVE-2024/CVE-2024-09xx/CVE-2024-0958.json) (`2024-02-02T02:20:21.333`) +* [CVE-2024-0470](CVE-2024/CVE-2024-04xx/CVE-2024-0470.json) (`2024-02-02T02:47:35.793`) +* [CVE-2024-0471](CVE-2024/CVE-2024-04xx/CVE-2024-0471.json) (`2024-02-02T02:48:16.190`) ## Download and Usage