Auto-Update: 2024-02-02T03:00:57.302409+00:00

This commit is contained in:
cad-safe-bot 2024-02-02 03:01:01 +00:00
parent 36efcf032a
commit fa6bf666f1
119 changed files with 4561 additions and 1957 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-1999-0239",
"sourceIdentifier": "cve@mitre.org",
"published": "1998-01-01T05:00:00.000",
"lastModified": "2008-09-09T12:34:03.477",
"lastModified": "2024-02-02T02:16:14.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -66,5 +88,20 @@
]
}
],
"references": []
"references": [
{
"url": "http://www.osvdb.org/122",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1731",
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-1999-1568",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-01-01T05:00:00.000",
"lastModified": "2017-10-10T01:29:06.937",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:49:01.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -58,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ncftpd:ncftpd_ftp_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.4.0",
"matchCriteriaId": "EAF82E73-3743-440F-BB2A-A23986512F72"
"criteria": "cpe:2.3:a:ncftp:ncftpd_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.1",
"matchCriteriaId": "3D72A5C7-F7F3-41D4-A909-DBBD0B00C05E"
}
]
}
@ -70,15 +92,27 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=91981352617720&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.securityfocus.com/archive/1/12699",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1833",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2000-0342",
"sourceIdentifier": "cve@mitre.org",
"published": "2000-04-28T04:00:00.000",
"lastModified": "2008-09-10T19:04:11.210",
"lastModified": "2024-02-02T02:05:13.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-59"
}
]
}
@ -58,13 +80,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A8B413-CD80-4D91-BE69-9063EA60345B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B"
"criteria": "cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "812A1AE1-56DE-4AA7-9AE8-FE36089189F5"
}
]
}
@ -76,16 +93,25 @@
"url": "http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077",
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Vendor Advisory"
]
},
{
"url": "http://www.peacefire.org/security/stealthattach/explanation.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/1157",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2001-0766",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-10-18T04:00:00.000",
"lastModified": "2008-09-05T20:24:52.847",
"lastModified": "2024-02-02T02:13:13.170",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,13 +66,14 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -62,6 +85,17 @@
"matchCriteriaId": "6DDD2F69-CFD4-4DEA-B43A-1337EEFA95A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8"
}
]
}
]
}
@ -71,6 +105,7 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -79,8 +114,11 @@
"url": "http://www.securityfocus.com/bid/2852",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2001-0795",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-10-18T04:00:00.000",
"lastModified": "2008-09-05T20:24:57.003",
"lastModified": "2024-02-02T02:12:41.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -58,8 +80,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:perception:liteserve:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2518FF-F247-409F-9711-CDA8AFFCFF5F"
"criteria": "cpe:2.3:a:cmfperception:liteserve:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "5281A4D3-2846-453A-A42C-21C9CDDDEF0D"
}
]
}
@ -71,6 +93,7 @@
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-06/0328.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -79,8 +102,11 @@
"url": "http://www.securityfocus.com/bid/2926",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-1042",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-07-02T04:00:00.000",
"lastModified": "2017-12-19T02:29:31.473",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:05:03.670",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-59"
}
]
}
@ -71,6 +93,9 @@
"url": "http://www.securityfocus.com/archive/1/194443",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
@ -78,13 +103,20 @@
"url": "http://www.securityfocus.com/bid/2960",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6760",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-1043",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-07-01T04:00:00.000",
"lastModified": "2017-10-10T01:29:58.797",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:04:50.130",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-59"
}
]
}
@ -67,10 +89,20 @@
}
],
"references": [
{
"url": "http://www.osvdb.org/1886",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/194445",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
@ -78,13 +110,20 @@
"url": "http://www.securityfocus.com/bid/2961",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6760",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-1238",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-07-16T04:00:00.000",
"lastModified": "2019-04-30T14:27:13.710",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:11:33.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -60,31 +82,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7"
}
]
}
@ -96,6 +93,9 @@
"url": "http://www.securityfocus.com/archive/1/197195",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
@ -103,13 +103,20 @@
"url": "http://www.securityfocus.com/bid/3033",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6919",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-1386",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-07-01T04:00:00.000",
"lastModified": "2017-10-10T01:30:02.890",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:02:58.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-59"
}
]
}
@ -58,68 +80,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE581DA0-0DEC-4C2D-B2CA-FFBDC39FAF95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.4.1_rc11:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0D720E-2C84-4AD8-8B2A-9F73E3396AB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.4.1_rc12:*:*:*:*:*:*:*",
"matchCriteriaId": "599F7D23-563D-439A-9868-F9169569282A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B1592D-0D0E-4B03-9414-82AAD16B680E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.41_rc14:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFFAD53-125B-4633-9AC4-A580B17A60F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:2.41_rc14:*:pro:*:*:*:*:*",
"matchCriteriaId": "8D405E5C-7528-44FA-A923-6467E5C00E7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "82BD6A19-CDF4-4873-9D1A-BD071DB16540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0:*:pro:*:*:*:*:*",
"matchCriteriaId": "48834DE9-009F-4ADF-882C-731AAE13216C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "24891A6D-A378-4598-BD99-2EB36166EC61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "EA997791-D567-4F7F-86B2-C17C9DF846B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r4:*:pro:*:*:*:*:*",
"matchCriteriaId": "02CE0404-0A9F-4D9B-BED8-175B91BD43D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "76D31E58-1956-4462-9808-7C46807B2CDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r5:*:pro:*:*:*:*:*",
"matchCriteriaId": "EDF7F8CF-6679-4F18-9D35-CA5063FC29EC"
"criteria": "cpe:2.3:a:texasimperialsoftware:wftpd:3.00:r5:*:*:pro:*:*:*",
"matchCriteriaId": "12A21C8C-E924-4643-939F-BFD31BFDA1B4"
}
]
}
@ -129,20 +91,32 @@
"references": [
{
"url": "http://www.securityfocus.com/archive/1/194442",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/2957",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6760",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2001-1391",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-04-17T04:00:00.000",
"lastModified": "2017-10-10T01:30:02.970",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:56:22.740",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -59,8 +81,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.19",
"matchCriteriaId": "94EC6E59-F40D-4499-9EB3-7D7E175ABDE9"
"versionEndExcluding": "2.2.19",
"matchCriteriaId": "97E2B094-820F-4AA6-B648-257FBA39E2EE"
}
]
}
@ -70,50 +92,86 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=98575345009963&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=98637996127004&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=98653252326445&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=98684172109474&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=98759029811377&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=98775114228203&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=99013830726309&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.linux.org.uk/VERSION/relnotes.2219.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2001-047.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11162",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.debian.org/security/2001/dsa-047",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0083",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-03-15T05:00:00.000",
"lastModified": "2016-10-18T02:16:01.810",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:52:51.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-193"
}
]
}
@ -72,63 +94,10 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EED5E506-9D2B-4CAF-8455-B9BE7696E49C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE7CB94E-0479-4939-86F6-0B4BEDE2E739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78135400-BA1A-42AA-BE17-5588442BCF11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2EDC0-3189-4523-882B-9188C852F793"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2991C07-5486-4590-A74E-46A379DD3339"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9BE06-0A36-4853-ADF4-9C1A1854278A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC57F38-6545-497B-B6DA-FCAF51755988"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*",
"matchCriteriaId": "0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*",
"matchCriteriaId": "4B235167-9554-4431-88C5-9472DD36FCDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E05D8E86-EC01-4589-B372-4DEB7845C81F"
"criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "3.1",
"matchCriteriaId": "57BE3D9D-42CA-45A4-A2BB-A7154F177A45"
},
{
"vulnerable": true,
@ -323,98 +292,174 @@
"references": [
{
"url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-004.txt.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.10/CSSA-2002-SCO.10.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.11/CSSA-2002-SCO.11.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-03/0108.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0060.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000467",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=101552065005254&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=101553908201861&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=101561384821761&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=101586991827622&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://online.securityfocus.com/advisories/3960",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://online.securityfocus.com/archive/1/264657",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2002-012.0.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-119",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/8383.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-019.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.linuxsecurity.com/advisories/other_advisory-1937.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2002_009_openssh_txt.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.openbsd.org/advisories/ssh_channelalloc.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/730",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-043.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/4241",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0485",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2016-10-18T02:20:28.680",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:17:09.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -69,11 +91,17 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=101684260510079&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=vuln-dev&m=101681724810317&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0653",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-07-11T04:00:00.000",
"lastModified": "2016-10-18T02:21:07.343",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:50:09.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -58,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mod_ssl:mod_ssl:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:modssl:mod_ssl:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.8.9",
"matchCriteriaId": "60B71520-78FD-4935-BC0B-D1F299DD2B11"
"matchCriteriaId": "844D1E7A-906B-421C-8C22-A612E16C72C5"
}
]
}
@ -70,75 +92,132 @@
"references": [
{
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-031.0.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-06/0350.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/hp/2002-q3/0018.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000504",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102513970919836&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=102563469326072&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://marc.info/?l=vuln-dev&m=102477330617604&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2002-164.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2002/dsa-135",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.iss.net/security_center/static/9415.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-048.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2002_028_mod_ssl.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-134.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-135.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-136.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2002-146.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-106.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/5084",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2002-0844",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2017-10-10T01:30:07.610",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:49:53.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -58,8 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:derek_price:cvsd:1.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4BFB7BD-815B-4650-AB9B-54853F1F9893"
"criteria": "cpe:2.3:a:distrotech:cvs:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.11.2",
"matchCriteriaId": "D5C6F868-918D-4055-A13A-4D752FC1BFD4"
}
]
}
@ -71,18 +94,23 @@
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-035.0.txt",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0081.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Vendor Advisory"
@ -90,23 +118,36 @@
},
{
"url": "http://marc.info/?l=bugtraq&m=102233767925177&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-004.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/4829",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9175",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2003-0252",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-08-18T04:00:00.000",
"lastModified": "2018-05-03T01:29:19.990",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:56:45.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -62,38 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "025FEFFD-12DD-4D29-A0FA-93DF96AFCFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "474B82D5-5D48-41ED-B2C1-68907A27491F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69A6C9CB-446C-4ACF-B2CA-41A1BD5F229A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3E68D7A7-DCEA-417D-AA56-D7B2EB410CDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "813B76CA-5083-4697-A484-435113B7FF88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0964EDA2-D86C-4189-9B03-61A292601649"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfs:nfs-utils:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2EFD8CFB-A24A-49F0-856C-4B985E203C9A"
"criteria": "cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "DF4ADA89-AAB7-4BFE-8FA8-A36123830844"
}
]
}
@ -105,6 +98,7 @@
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0023.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -112,75 +106,137 @@
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0024.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://isec.pl/vulnerabilities/isec-0010-linux-nfs-utils.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=105820223707191&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=105830921519513&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://marc.info/?l=bugtraq&m=105839032403325&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/9259",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1007187",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001262.1-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2003/dsa-349",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/258564",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:076",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2003_031_nfs_utils.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-206.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2003-207.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/8179",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.turbolinux.com/security/TLSA-2003-44.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12600",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A443",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2003-0411",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-06-30T04:00:00.000",
"lastModified": "2016-10-18T02:33:41.330",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:18:03.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,13 +70,14 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -62,13 +85,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*",
"matchCriteriaId": "0F6B3BC6-9A4B-40E7-A540-9BCFC3D02E66"
"criteria": "cpe:2.3:a:oracle:sun_one_application_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7514FCF4-3C0C-49F4-929E-A5EF62AD8FE2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685F1981-EA61-4A00-89F8-A748A88962F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*",
"matchCriteriaId": "9760BDBA-E5FD-4AFF-ACB8-4C8B55CC3A61"
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
}
]
}
@ -78,24 +112,33 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=105409846029475&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F55221&zone_32=category%3Asecurity",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000610.1-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.ciac.org/ciac/bulletins/n-103.shtml",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -104,6 +147,7 @@
"url": "http://www.iss.net/security_center/static/12093.php",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
@ -112,14 +156,20 @@
"url": "http://www.securityfocus.com/bid/7709",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "http://www.spidynamics.com/sunone_alert.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2004-0346",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-11-23T05:00:00.000",
"lastModified": "2017-07-11T01:30:05.353",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:48:38.283",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-193"
}
]
}
@ -58,23 +80,25 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "31D12FAE-5839-4123-876E-0A32DA2B1A42"
"criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.7",
"versionEndExcluding": "1.2.9",
"matchCriteriaId": "2C0C66FF-D0E0-48D9-9181-F403D503E040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C11D565E-0A90-4093-AA87-34A6DAE68E88"
"criteria": "cpe:2.3:a:proftpd:proftpd:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC036C6-445D-4A6E-8B22-799CE611C05C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C5CBBA-43CE-4D77-9DA4-D4C4E010978B"
"criteria": "cpe:2.3:a:proftpd:proftpd:1.2.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "44670EA1-33E7-486B-80C0-743C09632F65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD92BA-407E-4089-A98F-6D1309D8C294"
"criteria": "cpe:2.3:a:proftpd:proftpd:1.2.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "777FBAE6-3BA4-436A-85FC-B59DCFB89160"
}
]
}
@ -84,19 +108,29 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=107824679817240&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.securityfocus.com/bid/9782",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15387",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-0269",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-02T04:00:00.000",
"lastModified": "2017-07-11T01:32:10.890",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:15:17.823",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-178"
}
]
}
@ -58,58 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "08E70D59-49EB-4A2B-80CA-0BD651050DDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.31:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBA9CFF-F981-4603-9899-AF33D9A06E9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F384348F-4D25-4554-96FD-DAD9F114D6F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.33:*:*:*:*:*:*:*",
"matchCriteriaId": "E64226B8-DC52-495E-BBB7-D87E957959CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.34:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA8ABCF-ECEE-4D8E-8C21-D3E3FBA3A8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.35:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE17003-86D7-4DBF-8505-DA1C0A577379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.36:*:*:*:*:*:*:*",
"matchCriteriaId": "008FCD6F-3031-4FB7-AE33-EF570143C52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.37:*:*:*:*:*:*:*",
"matchCriteriaId": "458802ED-A3D7-433C-AE78-135384BEC79E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.38:*:*:*:*:*:*:*",
"matchCriteriaId": "FD69FD0C-DCED-4CF7-8D60-5E74BA019C84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.39:*:*:*:*:*:*:*",
"matchCriteriaId": "83D1664D-CE27-4AFA-8A91-13F7519ABDCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sir:gnuboard:3.40:*:*:*:*:*:*:*",
"matchCriteriaId": "0E54CBFB-282D-4036-9D6E-C1EC216517E3"
"criteria": "cpe:2.3:a:sir:gnuboard:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.40",
"matchCriteriaId": "BFF591A1-0AFC-4182-9AC2-31933C6C9B33"
}
]
}
@ -119,15 +92,35 @@
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=110477648219738&w=2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List"
]
},
{
"url": "http://secunia.com/advisories/13711",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/12149",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18729",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-0587",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-03-25T05:00:00.000",
"lastModified": "2017-10-11T01:29:58.187",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:03:45.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -44,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-59"
}
]
}
@ -58,158 +80,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4"
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.1",
"matchCriteriaId": "F23F3867-1318-4ACF-A3A6-F0605BDA8BA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*",
"matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "010B34F4-910E-4515-990B-8E72DF009578"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C656A621-BE62-4BB8-9B25-A3916E60FA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D3F91A1-7DD9-4146-8BA4-BE594C66DD30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*",
"matchCriteriaId": "82A6419D-0E94-4D80-8B07-E5AB4DBA2F28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED69BEB9-8D83-415B-826D-9D17FB67976B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BCDB64E5-AE26-43DF-8A66-654D5D22A635"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.5:alpha:*:*:*:*:*:*",
"matchCriteriaId": "3D8CB42F-8F05-45A6-A408-50A11CC132DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "407F69BE-4026-4B26-AC31-11E7CC942760"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6E8264B5-4D4B-453D-B599-E2AD533A0CF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED9D75F1-8333-43DE-A08B-142E4C5899D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF63077-4E98-497D-8CE6-B84B022DB21D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.6:alpha:*:*:*:*:*:*",
"matchCriteriaId": "2FEC6B13-3088-4ECB-9D81-6480F439601C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "20ECA520-780A-4EF8-8C80-B7564F4148B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FCEAEDEB-0EE7-4221-B9B8-65438580D331"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*",
"matchCriteriaId": "78A75EE3-DC19-4F21-86F4-834FCEAFEFA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*",
"matchCriteriaId": "F610FFD5-DF37-4075-AE8B-8D89DF6205A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D093FD25-94C8-49B8-A452-438023BFB105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3346E7D0-D7EF-4182-BD86-837F14EEB9FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "150F1B28-0FAB-4880-B1D5-7F244A1C4D31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE7EA3B-3BF8-4696-9488-78506074D62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFD7AF7-0FE9-4F56-98B0-60FC7F7F1B78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C883B45F-D28D-428E-AAF7-F93522A229DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA659B9-2A00-45A6-A462-4E0A20FB7F81"
"criteria": "cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.6",
"matchCriteriaId": "E6F232DA-F897-4429-922E-F5CFF865A8AA"
}
]
}
@ -217,6 +96,13 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/19823",
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.mozilla.org/security/announce/mfsa2005-21.html",
"source": "secalert@redhat.com",
@ -226,15 +112,26 @@
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_04_25.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/12659",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100037",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-3623",
"sourceIdentifier": "secalert@redhat.com",
"published": "2005-12-31T05:00:00.000",
"lastModified": "2017-10-11T01:30:26.810",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:19:08.297",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -44,7 +44,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "CWE-862"
}
]
}
@ -71,6 +71,7 @@
"url": "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Patch"
]
},
@ -78,31 +79,81 @@
"url": "http://lkml.org/lkml/2005/12/23/171",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "http://secunia.com/advisories/18788",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19038",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/21465",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/22417",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_06_kernel.html",
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2006-0575.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/bid/16570",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11707",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-2237",
"sourceIdentifier": "cret@cert.org",
"published": "2007-06-06T20:30:00.000",
"lastModified": "2018-10-16T16:42:44.023",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:57:51.567",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-369"
}
]
}
@ -62,33 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"matchCriteriaId": "E43BBC5A-057F-4BE2-B4BB-6791DDB0B9C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
"matchCriteriaId": "7E439FA5-78BF-41B1-BAEC-C1C94CE86F2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*",
"matchCriteriaId": "C29F02ED-85FC-4D22-A6DE-5F9C77ECCD70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"matchCriteriaId": "1AB9988B-5A9C-4F6D-BCCC-4D03AC6E4CF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*",
"matchCriteriaId": "FB2BE2DE-7B06-47ED-A674-15D45448F357"
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3"
}
]
}
@ -96,40 +93,77 @@
}
],
"references": [
{
"url": "http://osvdb.org/38494",
"source": "cret@cert.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.csis.dk/dk/forside/GdiPlus.pdf",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/290961",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/archive/1/470746/100/0/threaded",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/24346",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1018202",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/2083",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34743",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/4044",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-2723",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-05-16T22:30:00.000",
"lastModified": "2018-10-16T16:45:15.353",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:59:48.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-369"
}
]
}
@ -62,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:media_player_classic:media_player_classic:6.4.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E45C3556-C056-46F4-A053-BC94233C12BF"
"criteria": "cpe:2.3:a:mpc-hc:media_player_classic:6.4.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFD3824-C5CC-4891-B8A0-206014A5A1C0"
}
]
}
@ -71,21 +93,47 @@
}
],
"references": [
{
"url": "http://osvdb.org/37376",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/468626/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/archive/1/468758/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/23991",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34299",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,9 +2,9 @@
"id": "CVE-2007-4268",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-11-15T01:46:00.000",
"lastModified": "2017-07-29T01:32:49.300",
"vulnStatus": "Modified",
"evaluatorImpact": "\"By sending a maliciously crafted AppleTalk message, a local user may\r\ncause an unexpected system shutdown or arbitrary code execution with\r\nsystem privileges.\"",
"lastModified": "2024-02-02T02:35:40.717",
"vulnStatus": "Analyzed",
"evaluatorImpact": "\"By sending a maliciously crafted AppleTalk message, a local user may\ncause an unexpected system shutdown or arbitrary code execution with\nsystem privileges.\"",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -49,7 +71,7 @@
"description": [
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-681"
}
]
}
@ -63,58 +85,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0760FDDB-38D3-4263-9B4D-1AF5E613A4F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD4DE58-46C7-4E69-BF36-C5FD768B8248"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CF824694-52DE-44E3-ACAD-60B2A84CD3CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B73A0891-A37A-4E0D-AA73-B18BFD6B1447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0C580935-0091-4163-B747-750FB7686973"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BB0F2132-8431-4CEF-9A3D-A69425E3834E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8719F3C4-F1DE-49B5-9301-22414A2B6F9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "09ED46A8-1739-411C-8807-2A416BDB6DFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8D089858-3AF9-4B82-912D-AA33F25E3715"
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndIncluding": "10.4.10",
"matchCriteriaId": "ED9822D0-73F1-4B57-ADB5-0EBA7F78C7F1"
}
]
}
@ -124,38 +98,74 @@
"references": [
{
"url": "http://docs.info.apple.com/article.html?artnum=307041",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=628",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/27643",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://securitytracker.com/id?1018950",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/26444",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/3868",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38476",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2007-4988",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-24T22:17:00.000",
"lastModified": "2018-10-15T21:39:24.333",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:45:07.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,11 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-189"
"value": "CWE-681"
}
]
}
@ -66,288 +84,34 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D83FADC-4C7F-4C16-BBAA-9883D7449744"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.5-9",
"matchCriteriaId": "12DE5EB8-BDC6-4D86-B3DD-0610E9DF93D9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "04A019EA-DB16-41D5-A625-CBD96F24416E"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D2563ABE-D1C3-4AB8-BC41-8029E358C2CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B45B5EE8-00FB-46FE-9A26-7468AD30B540"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6534A963-C0A7-47D6-8E1B-B8D0F3933428"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8BDC9494-E79B-4497-8413-A44DF326ABB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2_1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "22890DA5-6F77-4CA5-8DE4-0C66C3A3D370"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.3_.2_1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5E16A926-05F2-495E-B17B-D23624F55A2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1F61BB-FF5B-4196-8723-AA165B077E36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B02E4063-E2B2-4EC5-9864-D2FB3E73F574"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_20030409:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FA6C29-443C-4A33-AA14-56ADA6D052F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "193A610A-5E5E-4A87-A501-902100D1C2AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:5.5.7.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B9C7FD38-93D3-456B-ABD5-9A2A8A0716E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A27CAC75-BFE8-4865-A6AE-20225BFCDBA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6393827E-8F17-4C95-B1E2-D6049B8AA63F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "46F682CD-0117-4770-877F-1F3903BAFE04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5717E4CF-15CD-4369-801F-7E113F0FAFB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A34B9CBD-54BC-4131-820F-9483E50086BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD7EB24-20F1-493F-BD38-DF39638C319B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6E66D8-BEC4-4E0D-BAAE-979618405C21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5E62DFAA-1EFC-40D6-A4B5-9113DF0656B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D8BD0D69-A809-4DD3-824B-C68E3EF4F724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F91C63C5-765B-4511-B6CF-CA09433DE051"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC271B0-ACAC-478E-B00B-FFBAAE33B5E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9BACC6-DEF1-4C20-B627-3AA55471B372"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA96D5B-FD43-418E-980C-22DEBA4FC03D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83A3469D-AE33-4933-A4F2-3DEFF3F223F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A55053EA-780E-46A9-91AE-F983DD54D154"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8168249B-863D-44E3-8BC3-B877A64981B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A688471B-3A88-410B-AAD3-20A75E1A767E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "02F76B8D-D105-4106-B52C-FC201F5930AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB7AE5B-83D9-4DF5-A9A0-B0412D8C0B1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "600590DA-A2F4-488F-B85B-9B3B86A8FC6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "096FC2CB-49A7-444A-BDA6-802E123A9ED2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB2E37B-323A-4336-B081-56BD32260E0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "311D7BB5-0740-4122-8465-B03B5C40351A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "03ADE3A3-8FA5-439A-97ED-6EE93ED43699"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11A48433-240E-4555-966B-4BA767AA3C6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0900904-462F-47DF-82C8-DD69D3E1EC2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CB80DF3F-DE3F-4CB3-B021-26B8D9F3B550"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F2BF18B6-A20E-44D1-A9D1-0F7762E0C506"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA9ACBD-6065-4340-B987-560BE5A54FE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2AEEF22D-83DE-41FA-941C-C02C45D7B5DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "74068962-7689-4155-91D7-506CD30BAFB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD4D7D7-C230-4986-9CA8-C4C7F9B9DC88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE3052B-3341-4B5C-A21F-4A10984D2641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8A57BE9F-C790-4BEF-9A91-E6C565A1C1D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "572F13C8-4FCC-4BF2-BECA-D957AC62DD51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9DC98B-77B4-4CB3-BEAA-71ECC9805BAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0F3B37-EE8D-46F3-861C-4D90E2699AAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5410220-889F-4D5F-9C23-3442272F4327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A317A0F-D871-49B8-8D0D-EE96DF7B6622"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3_3:*:*:*:*:*:*:*",
"matchCriteriaId": "93E858A4-1BB5-4CEF-B2D4-EEA3DE3D8218"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3_5:*:*:*:*:*:*:*",
"matchCriteriaId": "D09D188F-0193-435C-BBAF-B3977B6997F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.3_6:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB9051F-CFA7-4ACC-AB6F-0FBB10A8A076"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "195D7B1C-7550-480A-B2B8-7D868B654674"
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501"
}
]
}
@ -357,75 +121,188 @@
"references": [
{
"url": "http://bugs.gentoo.org/show_bug.cgi?id=186030",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=597",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/26926",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/27048",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/27309",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/27364",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/27439",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/28721",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/29786",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://secunia.com/advisories/36260",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200710-27.xml",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://studio.imagemagick.org/pipermail/magick-announce/2007-September/000037.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.debian.org/security/2009/dsa-1858",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.imagemagick.org/script/changelog.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:035",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2007_23_sr.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2008-0145.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securityfocus.com/archive/1/483572/100/0/threaded",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/25765",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit",
"Patch"
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id?1018729",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/usn-523-1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/3245",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36737",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://issues.rpath.com/browse/RPL-1743",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9656",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-6548",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-03-30T01:30:00.500",
"lastModified": "2009-03-30T04:00:00.000",
"lastModified": "2024-02-02T02:17:39.833",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -48,7 +48,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "CWE-862"
}
]
}
@ -75,6 +75,7 @@
"url": "http://hg.moinmo.in/moin/1.6/rev/35ff7a9b1546",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
@ -82,8 +83,16 @@
"url": "http://moinmo.in/SecurityFixes",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "http://osvdb.org/48877",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-3781",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-10-26T17:30:00.420",
"lastModified": "2017-08-17T01:31:16.337",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:10:32.800",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -48,34 +48,22 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "989E928E-AB25-4B0E-B23E-28825343EA59"
"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:drupal:*:*",
"matchCriteriaId": "5157C153-BECD-4169-BCF7-FB8B6D99FB98"
}
]
}
@ -87,24 +75,23 @@
"url": "http://drupal.org/files/issues/filefield-node-access-fix-516104-3.patch",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
"Patch"
]
},
{
"url": "http://drupal.org/node/516104",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://drupal.org/node/609874",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
"Release Notes"
]
},
{
@ -112,19 +99,34 @@
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/37130",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/36792",
"source": "cve@mitre.org",
"tags": [
"Patch"
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53897",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2010-0258",
"sourceIdentifier": "secure@microsoft.com",
"published": "2010-03-10T22:30:01.073",
"lastModified": "2018-10-12T21:56:41.913",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:38:22.823",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-843"
}
]
}
@ -82,13 +104,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25"
"criteria": "cpe:2.3:a:microsoft:office:2004:*:*:*:*:mac_os_x:*:*",
"matchCriteriaId": "A78DC369-DCAE-4D75-8C33-0FFF108640F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"matchCriteriaId": "5BA91840-371C-4282-9F7F-B393F785D260"
"criteria": "cpe:2.3:a:microsoft:office:2008:*:*:*:*:macos:*:*",
"matchCriteriaId": "421ACF1B-1B21-4416-98ED-BAA5C210EAE5"
},
{
"vulnerable": true,
@ -102,38 +124,28 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "E8A9B86A-21B8-4E2F-9DB8-1D1DFE718A0D"
"criteria": "cpe:2.3:a:microsoft:office_excel_viewer:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "EAC4BFBE-0AEF-42EA-9252-3E19A4ED6BF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "69286E7D-BA6E-479F-A9B3-2B9F54663847"
"criteria": "cpe:2.3:a:microsoft:office_excel_viewer:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "F142404A-9C14-4244-9364-23B90905C765"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*",
"matchCriteriaId": "E013CE59-0ABF-4542-A9E9-D295AA0FC2A2"
"criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:*:*:*:*:*:*",
"matchCriteriaId": "F007E987-9CCF-4786-AB23-C5F4AE51D5A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*",
"matchCriteriaId": "C0AEECDD-BBD0-4042-8A47-D66670A6DC6E"
"criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:*:*:*:*:*:*",
"matchCriteriaId": "875D8BED-E54F-4C54-9071-A3BAAF4493A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*",
"matchCriteriaId": "91A3E58F-E2FE-4346-9083-58C963171A73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*",
"matchCriteriaId": "6BE07062-6299-4371-BD74-BA7F7840DBA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"matchCriteriaId": "3807A4E4-EB58-47B6-AD98-6ED464DEBA4E"
"criteria": "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:*:*:*:macos:*:*",
"matchCriteriaId": "DB814642-71A7-4537-9476-A0D5E0BE96DB"
}
]
}
@ -143,26 +155,42 @@
"references": [
{
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=859",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securitytracker.com/id?1023698",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA10-068A.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-017",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8545",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-4577",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-12-22T01:00:03.157",
"lastModified": "2020-07-31T18:39:45.817",
"lastModified": "2024-02-02T02:39:54.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -49,6 +71,10 @@
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-843"
}
]
}
@ -124,21 +150,38 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
"Issue Tracking",
"Mailing List"
]
},
{
"url": "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
"Release Notes"
]
},
{
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/42648",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "http://secunia.com/advisories/43086",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -146,22 +189,23 @@
"url": "http://trac.webkit.org/changeset/72685",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
"Mailing List",
"Patch"
]
},
{
"url": "http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
"Mailing List",
"Patch"
]
},
{
"url": "http://www.debian.org/security/2011/dsa-2188",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -176,6 +220,7 @@
"url": "http://www.redhat.com/support/errata/RHSA-2011-0177.html",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -183,6 +228,7 @@
"url": "http://www.securityfocus.com/bid/45722",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
@ -191,6 +237,7 @@
"url": "http://www.vupen.com/english/advisories/2011/0216",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
@ -213,6 +260,7 @@
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-3629",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-05-18T15:59:15.807",
"lastModified": "2023-11-07T02:25:39.753",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:07:17.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -68,28 +90,63 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2015/May/28",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/74558",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-10743",
"sourceIdentifier": "report@snyk.io",
"published": "2019-10-29T19:15:16.610",
"lastModified": "2023-11-07T03:02:32.897",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:13:35.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -86,7 +86,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:archiver_project:archiver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"matchCriteriaId": "6034FCAA-1357-4BF8-BD00-0D79BBB49149"
"versionEndExcluding": "3.3.2",
"matchCriteriaId": "AB7F38AB-45A4-4A40-B7B7-27BB0EDCC299"
}
]
}
@ -98,7 +99,7 @@
"url": "https://github.com/mholt/archiver/pull/169",
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
"Issue Tracking"
]
},
{
@ -110,7 +111,7 @@
},
{
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728",
"source": "report@snyk.io",
"source": "nvd@nist.gov",
"tags": [
"Exploit",
"Third Party Advisory"
@ -118,7 +119,10 @@
},
{
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARC-174728%2C",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2639",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-09-01T21:15:09.600",
"lastModified": "2023-11-07T03:46:47.957",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:36:25.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,7 +50,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -170,8 +170,7 @@
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
"Patch"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29055",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-29T13:15:07.970",
"lastModified": "2024-01-29T15:15:08.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:06:07.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "En Apache Kylin versi\u00f3n 2.0.0 a 4.0.3, hay una interfaz web de configuraci\u00f3n de servidor que muestra el contenido del archivo 'kylin.properties', que puede contener credenciales del lado del servidor. Cuando el servicio kylin se ejecuta a trav\u00e9s de HTTP (u otro protocolo de texto plano), es posible que los rastreadores de red secuestren el payload HTTP y obtengan acceso al contenido de kylin.properties y potencialmente a las credenciales que lo contienen. Para evitar esta amenaza, se recomienda a los usuarios * activar siempre HTTPS para que el payload de la red est\u00e9 cifrado. * Evite poner credenciales en kylin.properties, o al menos no en texto plano. * Utilice firewalls de red para proteger el lado del servidor de modo que no sea accesible para atacantes externos. * Actualice a la versi\u00f3n Apache Kylin 4.0.4, que filtra el contenido confidencial que va a la interfaz web de Server Config."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -27,14 +50,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "4.0.4",
"matchCriteriaId": "6108FC48-5A83-486C-B698-7D42F0899DFF"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/29/1",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.apache.org/thread/o1bvyv9wnfkx7dxpfjlor20nykgsoh6r",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-32333",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:16.323",
"lastModified": "2024-02-02T02:15:16.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Maximo Asset Management 7.6.1.3 could allow a remote attacker to log into the admin panel due to improper access controls. IBM X-Force ID: 255073."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255073",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7112388",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36496",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-02-01T23:15:09.107",
"lastModified": "2024-02-01T23:15:09.107",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40058",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2023-12-21T17:15:07.763",
"lastModified": "2024-01-04T14:15:39.237",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:20:45.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45115",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-12-21T16:15:07.517",
"lastModified": "2024-01-02T14:15:08.167",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:28:37.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-46344",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.537",
"lastModified": "2024-02-02T02:15:16.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks."
}
],
"metrics": {},
"references": [
{
"url": "http://solar-log.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46706",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:09.333",
"lastModified": "2024-02-01T23:15:09.333",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46838",
"sourceIdentifier": "security@xen.org",
"published": "2024-01-29T11:15:07.933",
"lastModified": "2024-01-29T14:25:21.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:06:40.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,69 @@
"value": "Las solicitudes de transmisi\u00f3n en el protocolo de red virtual de Xen pueden constar de varias partes. Si bien no es realmente \u00fatil, excepto la parte inicial, cualquiera de ellos puede tener una longitud cero, es decir, no contener ning\u00fan dato. Adem\u00e1s de una cierta porci\u00f3n inicial de los datos a transferir, estas partes se traducen directamente en lo que Linux llama fragmentos SKB. Estas partes de solicitud convertidas pueden, cuando para un SKB en particular todas tienen longitud cero, provocar una desreferencia de NULL en el c\u00f3digo de red central."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14",
"versionEndExcluding": "6.7",
"matchCriteriaId": "CD62E8EA-4051-4EB9-AE74-F2A7B7F8FE13"
}
]
}
]
}
],
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-448.html",
"source": "security@xen.org"
"source": "security@xen.org",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47867",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:09.567",
"lastModified": "2024-02-01T23:15:09.567",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-48792",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.590",
"lastModified": "2024-02-02T02:15:16.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Zoho ManageEngine ADAudit Plus through 7250 is vulnerable to SQL Injection in the report export option."
}
],
"metrics": {},
"references": [
{
"url": "https://manageengine.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-48793",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-02T02:15:16.637",
"lastModified": "2024-02-02T02:15:16.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Zoho ManageEngine ADAudit Plus through 7250 allows SQL Injection in the aggregate report feature."
}
],
"metrics": {},
"references": [
{
"url": "https://manageengine.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49115",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:09.773",
"lastModified": "2024-02-01T23:15:09.773",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49610",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:10.003",
"lastModified": "2024-02-01T23:15:10.003",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49617",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:10.227",
"lastModified": "2024-02-01T23:15:10.227",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50326",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T01:15:07.710",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 275107.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275107",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50327",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T01:15:07.937",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which could allow a remote attacker to perform unauthorized file request modification. IBM X-Force ID: 275109.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-650"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275109",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50328",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:16.683",
"lastModified": "2024-02-02T02:15:16.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 may allow a remote attacker to view session identifiers passed via URL query strings. IBM X-Force ID: 275110.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-598"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275110",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-50933",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T01:15:08.140",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 275113.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275113",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50934",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:16.890",
"lastModified": "2024-02-02T02:15:16.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 uses single-factor authentication which can lead to unnecessary risk of compromise when compared with the benefits of a dual-factor authentication scheme. IBM X-Force ID: 275114.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-308"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275114",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50935",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.087",
"lastModified": "2024-02-02T02:15:17.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict access to a URL or resource, which may allow a remote attacker to obtain unauthorized access to application functionality and/or resources. IBM X-Force ID: 275115.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-425"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275115",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50936",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T01:15:08.310",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 275116.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275116",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50937",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T01:15:08.520",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 275117.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275117",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50938",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.277",
"lastModified": "2024-02-02T02:15:17.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 275128.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275128",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50939",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T00:15:54.540",
"lastModified": "2024-02-02T00:15:54.540",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50940",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T01:15:08.753",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 275130.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-942"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275130",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50941",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.467",
"lastModified": "2024-02-02T02:15:17.467",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 does not provide logout functionality, which could allow an authenticated user to gain access to an unauthorized user using session fixation. IBM X-Force ID: 275131.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275131",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-50962",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-02T02:15:17.667",
"lastModified": "2024-02-02T02:15:17.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerSC 1.3, 2.0, and 2.1 MFA does not implement the \"HTTP Strict Transport Security\" (HSTS) web security policy mechanism. IBM X-Force ID: 276004.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/276004",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7113759",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51443",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-27T17:15:08.093",
"lastModified": "2024-01-08T16:15:46.677",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:23:51.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
@ -91,7 +91,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51766",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-24T06:15:07.673",
"lastModified": "2024-01-18T03:15:58.937",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-02-02T02:22:45.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
@ -101,6 +101,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
@ -207,19 +222,34 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lwn.net/Articles/956533/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
@ -240,7 +270,10 @@
},
{
"url": "https://www.youtube.com/watch?v=V8KPV96g1To",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5378",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-29T12:15:07.860",
"lastModified": "2024-01-29T14:25:21.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:06:20.437",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -50,22 +80,58 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:megabip:megabip:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.36.2",
"matchCriteriaId": "A61E360F-A37C-4E94-AA77-340F36667E38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smod:smodbip:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.21",
"matchCriteriaId": "E866378A-BD50-4001-9F9F-190B09F9DEAE"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2023/12/CVE-2023-5378",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2023/12/CVE-2023-5378",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://megabip.pl/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
},
{
"url": "https://smod.pl/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6221",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:10.510",
"lastModified": "2024-02-01T23:15:10.510",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6856",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.313",
"lastModified": "2024-01-07T11:15:14.967",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:31:59.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -111,15 +116,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6857",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.377",
"lastModified": "2024-01-07T11:15:15.063",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:32:05.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -107,6 +107,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -133,15 +138,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6858",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.420",
"lastModified": "2024-01-07T11:15:15.150",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:32:17.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -111,15 +116,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6859",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.467",
"lastModified": "2024-01-07T11:15:15.240",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:32:22.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -111,15 +116,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6860",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.510",
"lastModified": "2024-01-07T11:15:15.317",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:32:26.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -111,15 +116,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6861",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.560",
"lastModified": "2024-01-07T11:15:15.410",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:41:33.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -111,15 +116,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6862",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.603",
"lastModified": "2024-01-07T11:15:15.487",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:42:37.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,6 +79,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -105,15 +110,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6863",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.650",
"lastModified": "2024-01-07T11:15:15.567",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:35:16.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -110,11 +115,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6864",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.707",
"lastModified": "2024-01-07T11:15:15.660",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:43:04.313",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -85,6 +85,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -105,20 +110,32 @@
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015",
"source": "security@mozilla.org",
"tags": [
"Broken Link"
"Broken Link",
"Issue Tracking"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6865",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.777",
"lastModified": "2024-01-07T11:15:15.740",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:35:21.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,6 +79,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -105,11 +110,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6866",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.847",
"lastModified": "2024-01-07T11:15:15.853",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:35:26.300",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,7 +79,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6867",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.933",
"lastModified": "2024-01-07T11:15:15.940",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:35:33.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,6 +79,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -105,11 +110,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5581",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6868",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:07.983",
"lastModified": "2024-01-07T11:15:16.030",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:28:41.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -91,7 +91,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6869",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:08.040",
"lastModified": "2024-01-07T11:15:16.117",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:29:05.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,7 +79,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6870",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:08.087",
"lastModified": "2024-01-07T11:15:16.200",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:29:09.893",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -96,7 +96,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6871",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:08.133",
"lastModified": "2024-01-07T11:15:16.287",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:29:14.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,7 +79,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6872",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:08.180",
"lastModified": "2024-01-07T11:15:16.370",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:29:18.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -79,7 +79,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-56/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6873",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-12-19T14:15:08.227",
"lastModified": "2024-01-07T11:15:16.447",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:29:27.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -73,6 +73,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -99,11 +104,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-10",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5582",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6879",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-12-27T23:15:07.530",
"lastModified": "2024-01-07T02:15:43.893",
"vulnStatus": "Modified",
"lastModified": "2024-02-02T02:27:15.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -103,6 +103,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
@ -134,13 +139,18 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/",
"source": "cve-coordination@google.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0212",
"sourceIdentifier": "cna@cloudflare.com",
"published": "2024-01-29T10:15:08.013",
"lastModified": "2024-01-29T14:25:21.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:08:12.603",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@cloudflare.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cna@cloudflare.com",
"type": "Secondary",
@ -50,14 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudflare:cloudflare:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.12.3",
"matchCriteriaId": "F39EFAFE-8F19-4A04-8AED-E540A7245052"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cloudflare/Cloudflare-WordPress/releases/tag/v4.12.3",
"source": "cna@cloudflare.com"
"source": "cna@cloudflare.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/cloudflare/Cloudflare-WordPress/security/advisories/GHSA-h2fj-7r3m-7gf2",
"source": "cna@cloudflare.com"
"source": "cna@cloudflare.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0470",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T21:15:10.800",
"lastModified": "2024-01-17T18:27:01.340",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-02-02T02:47:35.793",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -104,8 +104,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97ADC395-708B-46E6-9FDB-B97645F44831"
"criteria": "cpe:2.3:a:code-projects:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5938CA79-F046-4802-A059-D3CADDB7680B"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0471",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T21:15:11.050",
"lastModified": "2024-01-17T18:27:15.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-02-02T02:48:16.190",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -104,8 +104,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97ADC395-708B-46E6-9FDB-B97645F44831"
"criteria": "cpe:2.3:a:code-projects:human_resource_integrated_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5938CA79-F046-4802-A059-D3CADDB7680B"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0958",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-27T06:15:48.183",
"lastModified": "2024-01-29T14:25:30.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:20:21.333",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -64,6 +84,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -75,18 +105,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swapnilsahu:stock_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85E733C8-F179-4B75-862D-53A6E4CAD5BC"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.252203",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.252203",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0959",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-27T11:15:17.497",
"lastModified": "2024-01-29T14:25:30.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:18:46.160",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -75,22 +95,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:standford:gibsonenv:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "503F6932-307F-4752-8F90-560D57914948"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bayuncao/vul-cve-7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/bayuncao/vul-cve-7/blob/main/dataset.pkl",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.252204",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.252204",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-27T12:15:07.903",
"lastModified": "2024-01-29T14:25:25.440",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:19:05.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -75,22 +95,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flink-extended:aiflow:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFEAE6F-9E53-49DC-B8E0-F7EA7EE20080"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bayuncao/vul-cve-8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/bayuncao/vul-cve-8/blob/main/dataset.pkl",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.252205",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.252205",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-27T13:15:07.973",
"lastModified": "2024-01-29T14:25:25.440",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:19:44.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -65,8 +85,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -75,26 +105,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libcoap:libcoap:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6015782B-1A2E-4F55-BA3F-D40FDAFAD2CE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/obgm/libcoap/issues/1310",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://github.com/obgm/libcoap/issues/1310#issue-2099860835",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/obgm/libcoap/pull/1311",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.252206",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.252206",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1014",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-29T14:15:09.437",
"lastModified": "2024-01-30T09:15:48.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:05:39.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -40,7 +60,7 @@
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -48,16 +68,62 @@
"value": "CWE-400"
}
]
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:se-elektronicgmbh:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB32F1D-8E3D-4C2F-BF31-A107C9963D25"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-se-elektronic-gmbh-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1015",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-29T14:15:09.657",
"lastModified": "2024-01-30T09:15:48.277",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:04:13.267",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
@ -40,7 +60,7 @@
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -48,16 +68,61 @@
"value": "CWE-94"
}
]
},
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:se-elektronicgmbh:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB32F1D-8E3D-4C2F-BF31-A107C9963D25"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:se-elektronicgmbh:e-ddc3.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3439959B-DB8A-4BE5-85EA-111851A8DC1E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-se-elektronic-gmbh-products",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-21399",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-02-02T01:15:08.970",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21399",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21764",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-02T00:15:54.767",
"lastModified": "2024-02-02T00:15:54.767",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21794",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-02T00:15:54.953",
"lastModified": "2024-02-02T00:15:54.953",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21852",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-01T23:15:10.730",
"lastModified": "2024-02-01T23:15:10.730",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:58:03.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21866",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-02T00:15:55.143",
"lastModified": "2024-02-02T00:15:55.143",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21869",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-02T00:15:55.340",
"lastModified": "2024-02-02T00:15:55.340",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22016",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-02T00:15:55.533",
"lastModified": "2024-02-02T00:15:55.533",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22096",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-02T00:15:55.713",
"lastModified": "2024-02-02T00:15:55.713",
"vulnStatus": "Received",
"lastModified": "2024-02-02T01:57:57.640",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,80 @@
"id": "CVE-2024-22559",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-29T14:15:09.940",
"lastModified": "2024-01-29T14:25:21.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-02-02T02:03:48.573",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "LightCMS v2.0 is vulnerable to Cross Site Scripting (XSS) in the Content Management - Articles field."
},
{
"lang": "es",
"value": "LightCMS v2.0 es vulnerable a Cross Site Scripting (XSS) en el campo Content Management - Articles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lightcms_project:lightcms:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "188FCA72-D81E-48AA-8C49-58CB4BCD877F"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/eddy8/LightCMS/issues/34",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More