mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-06-28T18:00:23.237321+00:00
This commit is contained in:
parent
b1f1f176dc
commit
fcda66eba8
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2010-0738",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2010-04-28T22:30:00.447",
|
||||
"lastModified": "2023-02-13T04:16:44.297",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:29:24.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,98 +89,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9830D64-C46F-4423-BE0B-0B1FDB765D62"
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D3EADF4-5496-4F5F-B0A6-DBF959C4D7B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "599FBAC3-2E83-443B-AACB-99BBA896CB19"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43590B58-A1C7-4105-A00F-6C4F46A6CC5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A44F907E-AE57-4213-B001-A23319B72CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "243ED156-851C-4897-AF59-86FCA5C9C66F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "125BF8B0-AF1B-4FB1-9D41-D9FB30AE23FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3E7C299-8A2D-4733-98AC-F6FA37CC1C6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7398F80B-8318-40E7-A0EE-6CCF7E066C03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp08:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F13F52B9-88F8-4F56-BF91-C6FEF22F067D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4816097-6982-4FBA-BD34-3D24BCA5A56A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp01:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B3E4026-F98E-4AEB-9FE1-4FFBBF44AC55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp02:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "960A513A-CAFC-4B3D-ABD7-4659CF545C73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp03:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2D8DC6D-5E39-4A53-8BB8-F998706D573F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp04:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AA2D64E-D7E7-400D-AC7E-CB2045750791"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp05:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197F047B-E11C-4B79-B6C4-79B2C278A33F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp06:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCE383FE-3C03-4B4F-A2E6-AD673F8A44FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp07:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62A85D7D-B60A-4566-BA4B-2F74E452C4EE"
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE2A6BEF-2917-437C-A1D5-EE1601FC0A5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -167,61 +105,102 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=132129312609324&w=2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=35",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/39563",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securityreason.com/securityalert/8408",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1023918",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/39710",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0992",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=574105",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58147",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2010-1428",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2010-04-28T22:30:00.793",
|
||||
"lastModified": "2017-08-17T01:32:21.977",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:24:36.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,90 +89,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp08:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.2.0",
|
||||
"matchCriteriaId": "E8E0B7BE-9F4D-4083-B08A-13CA20422820"
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D3EADF4-5496-4F5F-B0A6-DBF959C4D7B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:cp07:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.3.0",
|
||||
"matchCriteriaId": "4906489F-828A-4351-8D5B-A989CED8E4A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9830D64-C46F-4423-BE0B-0B1FDB765D62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp01:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "599FBAC3-2E83-443B-AACB-99BBA896CB19"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp02:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43590B58-A1C7-4105-A00F-6C4F46A6CC5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp03:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A44F907E-AE57-4213-B001-A23319B72CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp04:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "243ED156-851C-4897-AF59-86FCA5C9C66F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp05:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "125BF8B0-AF1B-4FB1-9D41-D9FB30AE23FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp06:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3E7C299-8A2D-4733-98AC-F6FA37CC1C6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:cp07:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7398F80B-8318-40E7-A0EE-6CCF7E066C03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4816097-6982-4FBA-BD34-3D24BCA5A56A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp01:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B3E4026-F98E-4AEB-9FE1-4FFBBF44AC55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp02:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "960A513A-CAFC-4B3D-ABD7-4659CF545C73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp03:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2D8DC6D-5E39-4A53-8BB8-F998706D573F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp04:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AA2D64E-D7E7-400D-AC7E-CB2045750791"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp05:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197F047B-E11C-4B79-B6C4-79B2C278A33F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp06:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCE383FE-3C03-4B4F-A2E6-AD673F8A44FE"
|
||||
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE2A6BEF-2917-437C-A1D5-EE1601FC0A5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -159,56 +105,89 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=132698550418872&w=2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/39563",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1023917",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/39710",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0992",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=585899",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58148",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0376.html",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0377.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0378.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rhn.redhat.com/errata/RHSA-2010-0379.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2012-1710",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2012-05-03T22:55:02.967",
|
||||
"lastModified": "2017-12-07T02:29:12.273",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:24:50.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -92,7 +115,12 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1026949",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2013-0074",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2013-03-13T00:55:01.137",
|
||||
"lastModified": "2021-09-22T14:22:20.177",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:26:06.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -59,7 +82,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -68,160 +90,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.0.61118.0",
|
||||
"matchCriteriaId": "F09370A7-B4E3-4FFA-BB75-3E14FD7E2A13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AA0FEB3-5F4B-4B80-A1C8-C266FD94FAAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0988E68C-BB81-44B6-977E-33EF7EF6832B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "31A64C69-D182-4BEC-BA8A-7B405F5B2FC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.0.61118.0",
|
||||
"matchCriteriaId": "F09370A7-B4E3-4FFA-BB75-3E14FD7E2A13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AA0FEB3-5F4B-4B80-A1C8-C266FD94FAAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0988E68C-BB81-44B6-977E-33EF7EF6832B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "F282E5E8-A5C9-4092-B0BF-07A5A2CAA6F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "D16A8D29-57BF-4B74-85F2-24DBD8B52BBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE8E7D74-0DCB-4633-B502-EDC2112229BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DAA2E6F-A666-4136-8F6B-E35C313CAB2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.0.61118.0",
|
||||
"matchCriteriaId": "F09370A7-B4E3-4FFA-BB75-3E14FD7E2A13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AA0FEB3-5F4B-4B80-A1C8-C266FD94FAAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0988E68C-BB81-44B6-977E-33EF7EF6832B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55"
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndExcluding": "5.1.20125.0",
|
||||
"matchCriteriaId": "72D8E0A3-D4F9-427E-BAFE-80E211A56883"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -239,15 +110,25 @@
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-022",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16516",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16565",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2013-3896",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2013-10-09T14:53:25.230",
|
||||
"lastModified": "2018-10-12T22:05:14.557",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:26:01.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,38 +89,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AA0FEB3-5F4B-4B80-A1C8-C266FD94FAAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60818.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7857A98D-A532-4AD4-A565-87C1D86F67DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0988E68C-BB81-44B6-977E-33EF7EF6832B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0.61118.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8A4133E-7BC4-4CE7-B55A-BBB47DE51134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.1.10411.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF75D8B8-024E-4919-8B65-1F28377BC97C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.1.20125.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "604FEABE-24BC-40A3-9F36-F49A3F91559C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.1.20513.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "946C42B2-1807-42A8-A92E-165D06F99066"
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndExcluding": "5.1.20913.0",
|
||||
"matchCriteriaId": "260778BC-1CC3-4487-A334-BAD7FF050E8C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -109,20 +104,31 @@
|
||||
"url": "http://www.us-cert.gov/ncas/alerts/TA13-288A",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-087",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19003",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19055",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2013-3993",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2014-07-07T11:01:28.383",
|
||||
"lastModified": "2017-08-29T01:33:31.450",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:38:08.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,58 +90,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.0.2",
|
||||
"matchCriteriaId": "71860C47-8CC0-4B1C-983D-A3CAA2038837"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CBE42CA-7360-4EFB-96A1-69AA501F39A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3DC89107-6C8B-4CBE-8447-D5CC671BA01A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.1.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9286209C-B3B3-4B07-B074-1C5C4B241F84"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19F9BC39-CF55-456C-B463-DCA20EE8051B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0338ED25-41EC-4DFE-8003-9AD71928A582"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.3.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "994A78F4-61AD-4357-95B2-C7FF84DDA7FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:1.4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4B8A624-8424-426B-A476-8CE25E5152A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:2.0.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B66538E2-8A08-440E-8660-4279144068FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:2.1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "641A375A-E554-49C1-A47D-CA4E1DDB7EBA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_biginsights:2.1.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F6C5863-F678-48C0-AF97-8C8AB4F9F77E"
|
||||
"versionEndExcluding": "2.1.0.3",
|
||||
"matchCriteriaId": "BC61A537-1529-4E4A-A99C-0F32E2FF49FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -128,22 +101,35 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/59676",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677445",
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/68449",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84982",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2014-0546",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2014-08-12T21:55:06.460",
|
||||
"lastModified": "2017-01-07T02:59:30.983",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:28:59.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -67,255 +90,31 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0",
|
||||
"versionEndExcluding": "10.1.11",
|
||||
"matchCriteriaId": "CD19BFF7-EF91-49C0-AA1F-B709E530C4CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.0.08",
|
||||
"matchCriteriaId": "D3A84892-8348-4253-A330-F09AE518F40A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0",
|
||||
"versionEndExcluding": "10.1.11",
|
||||
"matchCriteriaId": "CDDC48C8-212B-47A4-A08A-024D7E4496B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366E85EF-ED5F-4D4D-9CBE-E69F7248CB2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56C05D36-1343-4571-9886-E1AE8952E096"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FBE0589-567D-4440-A51F-4EEC0A29DD44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823940EF-8B5F-44B0-8C74-2290A39DD15B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6944168-B6E8-4267-AE42-6E926B9CCB56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35D7E162-657C-4E1A-B394-80E457B3E366"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2F7EC9A-2CD6-4C75-8D2C-F48F1ACCEFF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57861404-0F93-4551-AB22-980546216FDF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AAA746EF-EC12-457E-AD04-9EA24406E2A7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "31AE30B2-940A-41A0-9EE0-32F0FE5B6C1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECCAE82D-AE87-4FC5-BC72-2D046468DCE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3597B29D-1871-460A-A128-86C6BB777F36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E72C3C61-511E-4977-B029-70277C68E24D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47478166-EE66-4837-A6C0-0A519F9EDD26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4E8E909-3277-429B-9CB2-973A606BB4A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1F0F0C4-0008-452E-99F5-6264465C3FFC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.5:-:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "FB938F41-0273-4028-897D-00E95D56A7C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A48CD244-BCF6-4D0F-B07D-44304493BCFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "86A84BB0-85D3-47E8-BC90-291E8C2CCEEC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3CA4B45-E643-4705-9B6C-8598A5357326"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADD314C8-A849-46C6-9ADD-72A2DF4C3219"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EFDECFD-E02F-4545-939B-8C18A0BD82A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D1565F5-8627-445B-AC76-662C08F215D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B10B4387-A6DB-4563-843E-0CF50F6293E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D917DF13-8582-455E-A8E6-3334F36553A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04E4C131-8681-4A7E-B4E1-A9E44FBFB29D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50550750-21FF-4814-8DE5-34E1EC8BA205"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDB13485-E261-4886-BCC1-98BF79E40907"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76AE8DD8-7A6E-473F-865D-46EA57321CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4AC0385-3E28-4D32-8554-6EB8D75E70CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10D5B006-F8CD-4B51-A5B6-A282C95C6C19"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51C67ABD-5800-46DD-9E81-2A586698BC90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9FF4675-A9FF-4B0F-BBC6-D29B6324D27D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76CE9DE1-FFB6-483B-A76C-38819C1407B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA71918B-F2B2-442B-AA12-3E16759B0674"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.5:-:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "693776A0-D3AA-4BF3-B8C2-DD76AC6DB1FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3BBFA7D7-1A9E-4751-A14A-62C2DB2672A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "106D9571-59BF-4056-B7CD-F70FC3F1B73B"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.0.08",
|
||||
"matchCriteriaId": "0CC694C1-EE8B-4247-AE25-262DD4F61BD0"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -344,7 +143,12 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1030711",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2014-2817",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-08-12T21:55:07.007",
|
||||
"lastModified": "2018-10-12T22:06:44.377",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:29:38.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,13 +75,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -68,31 +92,237 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "693D3C1C-E3E4-49DB-9A13-44ADDFF82507"
|
||||
},
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "80235DF1-9241-4DBD-B436-6AC38EFBCF32"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15BAAA8C-7AF1-46CE-9FFB-3A498508A1BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -102,15 +332,29 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/69092",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1030715",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-051",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2014-4077",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-11-11T22:55:04.637",
|
||||
"lastModified": "2018-10-12T22:07:00.957",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:28:11.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -66,58 +89,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:ime:*:*:*",
|
||||
"matchCriteriaId": "0D1B3336-5BF8-4FE9-9F59-2D675C5093D6"
|
||||
"criteria": "cpe:2.3:a:microsoft:office_2007_ime:-:*:*:ja:*:*:*:*",
|
||||
"matchCriteriaId": "DBE4DA56-D5B9-484E-BD88-F6169DA4D588"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F0931768-A4BD-4B42-840D-B098D504ECFE"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "198E2CF9-D9F6-45BC-92DC-3D06B398B741"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:itanium:*",
|
||||
"matchCriteriaId": "6DD5B2D3-AF03-4811-8C44-6B11280E2659"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "50F4F944-7FBC-4419-B684-711CA85CA59B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "2FBAFAE4-0D3C-4BB7-BE78-BB95E07FB867"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*",
|
||||
"matchCriteriaId": "34B5FE78-4F33-4FAF-B90C-2D41284D2904"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "F8216946-5F76-48B9-91CC-207F657D7D3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "B36BFDA7-596B-45EA-AACE-F8A796CECDBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:server_core:*:*:*:x86:*",
|
||||
"matchCriteriaId": "CA94B3B3-95CE-4733-BC0A-1E0E25783EFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:server_core:*:*:x64:*:*",
|
||||
"matchCriteriaId": "632B3DE3-1715-4692-8A9C-A095EAE4D100"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -131,18 +119,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:server_core:*:*:*:itanium:*",
|
||||
"matchCriteriaId": "5528FA44-2CA7-4166-B59F-EA2299B937FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "0161C884-70A5-4AD0-BD80-F0F7B3D8579E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "89F0F60A-C92C-4047-A803-B180F695377E"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -154,20 +132,35 @@
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2014/11/11/assessing-risk-for-the-november-2014-security-updates.aspx",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1031196",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1031197",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-078",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2014-4123",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-10-15T10:55:08.037",
|
||||
"lastModified": "2018-10-12T22:07:20.317",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:25:19.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,13 +75,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -68,31 +92,215 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A33FA7F-BB2A-4C66-B608-72997A2BD1DB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:7.0.5730:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3B85C32-02F5-43F5-8BBB-5A240F99BAA9"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
|
||||
"matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C043EDDD-41BF-4718-BDCF-158BBBDB6360"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5808661-A082-4CBE-808C-B253972487B4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
|
||||
"criteria": "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15BAAA8C-7AF1-46CE-9FFB-3A498508A1BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,24 +312,42 @@
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Not Applicable",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/60968",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/70326",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1031018",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2014-4148",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2014-10-15T10:55:08.693",
|
||||
"lastModified": "2019-02-26T14:04:02.400",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:24:23.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -84,11 +107,6 @@
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABC7A32C-4A4A-4533-B42E-350E728ADFEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC5F631C-5461-4C0B-AE80-079A987912DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
@ -96,23 +114,23 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB506484-7F0C-46BF-8EA6-4FB5AF454CED"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -132,23 +150,42 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/60970",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/70429",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-058",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96995",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2015-1671",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-05-13T10:59:03.910",
|
||||
"lastModified": "2018-10-12T22:08:40.557",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:26:19.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,13 +75,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-19"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -71,18 +95,40 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E039CE1F-B988-4741-AE2E-5B36E2AF9688"
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C3652F-6730-44B0-8200-FA51D935BBA0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "A7371547-290D-4D0D-B98D-CA28B4D2E8B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "792B417F-96A0-4E9D-9E79-5D7F982E2225"
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68C3652F-6730-44B0-8200-FA51D935BBA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -98,22 +144,144 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40B3A045-B08A-44E0-91BE-726753F6A362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0BB045C-AAC8-42F2-84A9-062630FA14E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "4426F8EF-9C49-4C77-B6D0-1A1865D02541"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "860C65B6-5CEA-4A9F-AC37-EF185132E8CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:lync:2010:*:*:*:attendee:*:*:*",
|
||||
@ -121,40 +289,13 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "1B0382F7-00EA-4057-A23E-F728EA6B03E8"
|
||||
"criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B854E18-7CB0-43F7-9EBF-E356FA176B2F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "359108EA-33F3-4F02-A069-C45399CB2EB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEECD12A-5BEF-4675-B62E-86CF4A7474D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "BB0CF266-A7EE-474A-B3D3-4A7FE33F4C2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "DC25ACD6-8F48-4534-AF7B-53F0D10C0843"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:*:developer_runtime:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5",
|
||||
"matchCriteriaId": "9F96598E-2B48-476E-98C6-26FE1F0EAFD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.1.30214.0",
|
||||
"matchCriteriaId": "F050528F-72ED-4AB6-A7A7-F85570147886"
|
||||
"criteria": "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6EF9A3D-4EB8-4B2E-B388-04CC0751A93F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -164,15 +305,29 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/74490",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1032281",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-044",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2015-2425",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2015-07-14T21:59:36.813",
|
||||
"lastModified": "2018-10-12T22:09:28.810",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:22:23.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,13 +75,14 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -70,6 +94,37 @@
|
||||
"matchCriteriaId": "D7809F78-8D56-4925-A8F9-4119B973A667"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -77,11 +132,20 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1032894",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2015-4495",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2015-08-08T00:59:04.597",
|
||||
"lastModified": "2023-09-12T14:55:31.563",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-06-28T17:23:00.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-05-25",
|
||||
"cisaActionDue": "2022-06-15",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -19,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,28 +90,15 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "39.0",
|
||||
"matchCriteriaId": "DAE46BF6-D699-4F4A-A4B3-5D758FF0DE61"
|
||||
"versionEndExcluding": "39.0.3",
|
||||
"matchCriteriaId": "5D3F7936-F749-405E-90E9-790890AD15EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A1DD76B-7682-4F61-B274-115D8A9B5306"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "332589F6-C6DB-4204-97FA-B60105BBF146"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.0.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A04D6EAE-C709-4752-976E-DB15EE6E85B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE52B8E3-3BA8-46DB-948E-958739FE91B1"
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "38.0",
|
||||
"versionEndExcluding": "38.1.1",
|
||||
"matchCriteriaId": "DE1456E9-CF7E-45B0-BCCF-8AC13A05541E"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -103,58 +113,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mozilla:firefox_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.1.0",
|
||||
"matchCriteriaId": "F3EF192A-A8DF-404D-8413-77A717EA0595"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA04C9F1-6257-4D82-BA0B-37DE66D94736"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
|
||||
"versionEndExcluding": "2.2",
|
||||
"matchCriteriaId": "82D6E428-7040-4708-857E-C2530DAB11B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -174,6 +134,261 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A67A7B7A-998D-4B8C-8831-6E58406565FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8308AC4F-897E-4E43-9885-DF0762640770"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5900A25-FDD7-4900-BF7C-F3ECCB714D2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58D3B6FD-B474-4B09-B644-A8634A629280"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F892F1B0-514C-42F7-90AE-12ACDFDC1033"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17D4B6F2-514D-4BC2-B2C5-4E2FCCAC594C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*",
|
||||
"matchCriteriaId": "67960FB9-13D1-4DEE-8158-31BF31BCBE6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
|
||||
"matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
|
||||
"matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
|
||||
"matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D41A798E-0D69-43C7-9A63-1E5921138EAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -181,17 +396,23 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -199,16 +420,25 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1581.html",
|
||||
@ -228,6 +458,7 @@
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -235,6 +466,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/76249",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -243,6 +475,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1033216",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -258,6 +491,7 @@
|
||||
"url": "https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
@ -277,11 +511,19 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/201512-10",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/37772/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2022-1227",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-04-29T16:15:08.753",
|
||||
"lastModified": "2023-11-07T03:41:49.707",
|
||||
"lastModified": "2024-06-28T16:15:03.017",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -240,6 +241,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240628-0001/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2023-3079",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-05T22:15:12.383",
|
||||
"lastModified": "2024-06-27T19:15:04.197",
|
||||
"lastModified": "2024-06-28T16:17:01.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2023-06-07",
|
||||
"cisaActionDue": "2023-06-28",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -119,8 +120,60 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
{},
|
||||
{}
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "114.0.5735.106",
|
||||
"matchCriteriaId": "572A3A40-DC77-4EF0-B85A-8195DA2A0491"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.1.5",
|
||||
"matchCriteriaId": "8D5763B2-C023-4C29-A30E-71B087A967DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:couchbase:couchbase_server:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBF7BB41-6DE4-45D5-81FE-A3CC055853F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2023-3454",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-04T17:15:09.000",
|
||||
"lastModified": "2024-04-04T19:24:50.670",
|
||||
"lastModified": "2024-06-28T16:15:03.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240628-0004/",
|
||||
"source": "sirt@brocade.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23215",
|
||||
"source": "sirt@brocade.com"
|
||||
|
@ -2,8 +2,16 @@
|
||||
"id": "CVE-2023-49115",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-02-01T23:15:09.773",
|
||||
"lastModified": "2024-06-25T14:15:10.687",
|
||||
"lastModified": "2024-06-28T17:15:03.173",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2023-5973",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-05T03:15:07.770",
|
||||
"lastModified": "2024-04-05T12:40:52.763",
|
||||
"lastModified": "2024-06-28T16:15:03.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240628-0005/",
|
||||
"source": "sirt@brocade.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23214",
|
||||
"source": "sirt@brocade.com"
|
||||
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2023-6240",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-04T14:15:47.787",
|
||||
"lastModified": "2024-06-05T17:15:11.093",
|
||||
"lastModified": "2024-06-28T16:15:03.453",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -172,6 +173,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240628-0002/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2024-2859",
|
||||
"sourceIdentifier": "sirt@brocade.com",
|
||||
"published": "2024-04-27T00:15:07.010",
|
||||
"lastModified": "2024-04-29T12:42:03.667",
|
||||
"lastModified": "2024-06-28T16:15:04.067",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -39,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240628-0003/",
|
||||
"source": "sirt@brocade.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23245",
|
||||
"source": "sirt@brocade.com"
|
||||
|
64
CVE-2024/CVE-2024-290xx/CVE-2024-29039.json
Normal file
64
CVE-2024/CVE-2024-290xx/CVE-2024-29039.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-29039",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-28T16:15:03.777",
|
||||
"lastModified": "2024-06-28T16:15:03.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file. As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "tpm2 es el repositorio de origen de las herramientas del M\u00f3dulo de plataforma segura (TPM2.0). Esta vulnerabilidad permite a los atacantes manipular las salidas de tpm2_checkquote alterando TPML_PCR_SELECTION en el archivo de entrada de PCR. Como resultado, los valores de resumen se asignan incorrectamente a las ranuras y bancos de PCR, lo que proporciona una imagen enga\u00f1osa del estado del TPM. Este problema se solucion\u00f3 en la versi\u00f3n 5.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-807"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tpm2-software/tpm2-tools/releases/tag/5.7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tpm2-software/tpm2-tools/security/advisories/GHSA-8rjm-5f5f-h4q6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-351xx/CVE-2024-35137.json
Normal file
64
CVE-2024/CVE-2024-351xx/CVE-2024-35137.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-35137",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-28T16:15:04.150",
|
||||
"lastModified": "2024-06-28T16:15:04.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could allow a local user to possibly elevate their privileges due to sensitive configuration information being exposed. IBM X-Force ID: 292413."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Security Access Manager Docker 10.0.0.0 a 10.0.7.1 podr\u00eda permitir que un usuario local posiblemente eleve sus privilegios debido a la exposici\u00f3n de informaci\u00f3n de configuraci\u00f3n confidencial. ID de IBM X-Force: 292413."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-258"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/292413",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7158790",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-351xx/CVE-2024-35139.json
Normal file
64
CVE-2024/CVE-2024-351xx/CVE-2024-35139.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-35139",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-06-28T16:15:04.380",
|
||||
"lastModified": "2024-06-28T16:15:04.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could allow a local user to obtain sensitive information from the container due to incorrect default permissions. IBM X-Force ID: 292415."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Security Access Manager Docker 10.0.0.0 a 10.0.7.1 podr\u00eda permitir que un usuario local obtenga informaci\u00f3n confidencial del contenedor debido a permisos predeterminados incorrectos. ID de IBM X-Force: 292415."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/292415",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7158790",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-385xx/CVE-2024-38521.json
Normal file
60
CVE-2024/CVE-2024-385xx/CVE-2024-38521.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38521",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-28T16:15:04.577",
|
||||
"lastModified": "2024-06-28T16:15:04.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hush Line is a free and open-source, anonymous-tip-line-as-a-service for organizations or individuals. There is a stored XSS in the Inbox. The input is displayed using the `safe` Jinja2 attribute, and thus not sanitized upon display. This issue has been patched in version 0.1.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Hush Line es una l\u00ednea de sugerencias an\u00f3nimas como servicio, gratuita y de c\u00f3digo abierto para organizaciones o individuos. Hay un XSS almacenado en la Bandeja de entrada. La entrada se muestra utilizando el atributo Jinja2 \"seguro\" y, por lo tanto, no se sanitiza al mostrarse. Este problema se solucion\u00f3 en la versi\u00f3n 0.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/scidsg/hushline/security/advisories/GHSA-4v8c-r6h2-fhh3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-385xx/CVE-2024-38522.json
Normal file
60
CVE-2024/CVE-2024-385xx/CVE-2024-38522.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-38522",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-28T17:15:03.527",
|
||||
"lastModified": "2024-06-28T17:15:03.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hush Line is a free and open-source, anonymous-tip-line-as-a-service for organizations or individuals. The CSP policy applied on the `tips.hushline.app` website and bundled by default in this repository is trivial to bypass. This vulnerability has been patched in version 0.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-183"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/scidsg/hushline/commit/2bbeae78a24ca2cd893f32a1812f5f6634cb21b6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/scidsg/hushline/security/advisories/GHSA-r85c-95x7-4h7q",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6402.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6402.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6402",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-28T17:15:03.810",
|
||||
"lastModified": "2024-06-28T17:15:03.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tenda A301 15.13.08.12. Affected by this vulnerability is the function fromSetWirelessRepeat of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269947. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/General-Offensive/iot_vuldb/blob/main/Tenda/A301/formSetDeviceName_devName.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.269947",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.269947",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.360696",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6403.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6403.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6403",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-28T17:15:04.140",
|
||||
"lastModified": "2024-06-28T17:15:04.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda A301 15.13.08.12. Affected by this issue is the function formWifiBasicSet of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269948. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/General-Offensive/iot_vuldb/blob/main/Tenda/A301/formSetDeviceName_devName.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.269948",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.269948",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.360752",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
89
README.md
89
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-28T16:01:07.532461+00:00
|
||||
2024-06-28T18:00:23.237321+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-28T15:15:03.047000+00:00
|
||||
2024-06-28T17:38:08.727000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255441
|
||||
255448
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `41`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-39348](CVE-2024/CVE-2024-393xx/CVE-2024-39348.json) (`2024-06-28T07:15:06.043`)
|
||||
- [CVE-2024-39349](CVE-2024/CVE-2024-393xx/CVE-2024-39349.json) (`2024-06-28T06:15:05.500`)
|
||||
- [CVE-2024-39350](CVE-2024/CVE-2024-393xx/CVE-2024-39350.json) (`2024-06-28T07:15:06.330`)
|
||||
- [CVE-2024-39351](CVE-2024/CVE-2024-393xx/CVE-2024-39351.json) (`2024-06-28T06:15:05.887`)
|
||||
- [CVE-2024-39352](CVE-2024/CVE-2024-393xx/CVE-2024-39352.json) (`2024-06-28T06:15:06.223`)
|
||||
- [CVE-2024-39704](CVE-2024/CVE-2024-397xx/CVE-2024-39704.json) (`2024-06-28T13:15:02.927`)
|
||||
- [CVE-2024-39708](CVE-2024/CVE-2024-397xx/CVE-2024-39708.json) (`2024-06-28T01:15:08.793`)
|
||||
- [CVE-2024-5424](CVE-2024/CVE-2024-54xx/CVE-2024-5424.json) (`2024-06-28T09:15:02.420`)
|
||||
- [CVE-2024-5570](CVE-2024/CVE-2024-55xx/CVE-2024-5570.json) (`2024-06-28T06:15:06.593`)
|
||||
- [CVE-2024-5662](CVE-2024/CVE-2024-56xx/CVE-2024-5662.json) (`2024-06-28T09:15:02.710`)
|
||||
- [CVE-2024-5727](CVE-2024/CVE-2024-57xx/CVE-2024-5727.json) (`2024-06-28T06:15:06.673`)
|
||||
- [CVE-2024-5728](CVE-2024/CVE-2024-57xx/CVE-2024-5728.json) (`2024-06-28T06:15:06.737`)
|
||||
- [CVE-2024-5729](CVE-2024/CVE-2024-57xx/CVE-2024-5729.json) (`2024-06-28T06:15:06.803`)
|
||||
- [CVE-2024-5730](CVE-2024/CVE-2024-57xx/CVE-2024-5730.json) (`2024-06-28T06:15:06.867`)
|
||||
- [CVE-2024-5735](CVE-2024/CVE-2024-57xx/CVE-2024-5735.json) (`2024-06-28T12:15:10.117`)
|
||||
- [CVE-2024-5736](CVE-2024/CVE-2024-57xx/CVE-2024-5736.json) (`2024-06-28T12:15:10.923`)
|
||||
- [CVE-2024-5737](CVE-2024/CVE-2024-57xx/CVE-2024-5737.json) (`2024-06-28T12:15:11.060`)
|
||||
- [CVE-2024-5788](CVE-2024/CVE-2024-57xx/CVE-2024-5788.json) (`2024-06-28T07:15:06.603`)
|
||||
- [CVE-2024-5796](CVE-2024/CVE-2024-57xx/CVE-2024-5796.json) (`2024-06-28T07:15:06.860`)
|
||||
- [CVE-2024-5863](CVE-2024/CVE-2024-58xx/CVE-2024-5863.json) (`2024-06-28T04:15:05.193`)
|
||||
- [CVE-2024-5864](CVE-2024/CVE-2024-58xx/CVE-2024-5864.json) (`2024-06-28T04:15:05.567`)
|
||||
- [CVE-2024-5922](CVE-2024/CVE-2024-59xx/CVE-2024-5922.json) (`2024-06-28T09:15:02.920`)
|
||||
- [CVE-2024-5925](CVE-2024/CVE-2024-59xx/CVE-2024-5925.json) (`2024-06-28T09:15:03.120`)
|
||||
- [CVE-2024-6288](CVE-2024/CVE-2024-62xx/CVE-2024-6288.json) (`2024-06-28T07:15:07.137`)
|
||||
- [CVE-2024-6296](CVE-2024/CVE-2024-62xx/CVE-2024-6296.json) (`2024-06-28T04:15:05.853`)
|
||||
- [CVE-2024-29039](CVE-2024/CVE-2024-290xx/CVE-2024-29039.json) (`2024-06-28T16:15:03.777`)
|
||||
- [CVE-2024-35137](CVE-2024/CVE-2024-351xx/CVE-2024-35137.json) (`2024-06-28T16:15:04.150`)
|
||||
- [CVE-2024-35139](CVE-2024/CVE-2024-351xx/CVE-2024-35139.json) (`2024-06-28T16:15:04.380`)
|
||||
- [CVE-2024-38521](CVE-2024/CVE-2024-385xx/CVE-2024-38521.json) (`2024-06-28T16:15:04.577`)
|
||||
- [CVE-2024-38522](CVE-2024/CVE-2024-385xx/CVE-2024-38522.json) (`2024-06-28T17:15:03.527`)
|
||||
- [CVE-2024-6402](CVE-2024/CVE-2024-64xx/CVE-2024-6402.json) (`2024-06-28T17:15:03.810`)
|
||||
- [CVE-2024-6403](CVE-2024/CVE-2024-64xx/CVE-2024-6403.json) (`2024-06-28T17:15:04.140`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `157`
|
||||
Recently modified CVEs: `22`
|
||||
|
||||
- [CVE-2024-39134](CVE-2024/CVE-2024-391xx/CVE-2024-39134.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-39207](CVE-2024/CVE-2024-392xx/CVE-2024-39207.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-39208](CVE-2024/CVE-2024-392xx/CVE-2024-39208.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-39209](CVE-2024/CVE-2024-392xx/CVE-2024-39209.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-3959](CVE-2024/CVE-2024-39xx/CVE-2024-3959.json) (`2024-06-28T13:21:52.223`)
|
||||
- [CVE-2024-39705](CVE-2024/CVE-2024-397xx/CVE-2024-39705.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-4011](CVE-2024/CVE-2024-40xx/CVE-2024-4011.json) (`2024-06-28T13:21:27.280`)
|
||||
- [CVE-2024-4395](CVE-2024/CVE-2024-43xx/CVE-2024-4395.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-4557](CVE-2024/CVE-2024-45xx/CVE-2024-4557.json) (`2024-06-28T13:19:24.767`)
|
||||
- [CVE-2024-4569](CVE-2024/CVE-2024-45xx/CVE-2024-4569.json) (`2024-06-28T13:10:05.153`)
|
||||
- [CVE-2024-4570](CVE-2024/CVE-2024-45xx/CVE-2024-4570.json) (`2024-06-28T13:38:13.630`)
|
||||
- [CVE-2024-4664](CVE-2024/CVE-2024-46xx/CVE-2024-4664.json) (`2024-06-28T13:28:06.347`)
|
||||
- [CVE-2024-4704](CVE-2024/CVE-2024-47xx/CVE-2024-4704.json) (`2024-06-28T13:27:26.267`)
|
||||
- [CVE-2024-4901](CVE-2024/CVE-2024-49xx/CVE-2024-4901.json) (`2024-06-28T13:18:19.407`)
|
||||
- [CVE-2024-5289](CVE-2024/CVE-2024-52xx/CVE-2024-5289.json) (`2024-06-28T13:13:36.980`)
|
||||
- [CVE-2024-5430](CVE-2024/CVE-2024-54xx/CVE-2024-5430.json) (`2024-06-28T13:17:34.380`)
|
||||
- [CVE-2024-5601](CVE-2024/CVE-2024-56xx/CVE-2024-5601.json) (`2024-06-28T13:25:40.677`)
|
||||
- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-5655](CVE-2024/CVE-2024-56xx/CVE-2024-5655.json) (`2024-06-28T13:16:40.613`)
|
||||
- [CVE-2024-6054](CVE-2024/CVE-2024-60xx/CVE-2024-6054.json) (`2024-06-28T13:11:58.810`)
|
||||
- [CVE-2024-6071](CVE-2024/CVE-2024-60xx/CVE-2024-6071.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-6127](CVE-2024/CVE-2024-61xx/CVE-2024-6127.json) (`2024-06-28T10:27:00.920`)
|
||||
- [CVE-2024-6283](CVE-2024/CVE-2024-62xx/CVE-2024-6283.json) (`2024-06-28T13:37:44.763`)
|
||||
- [CVE-2024-6307](CVE-2024/CVE-2024-63xx/CVE-2024-6307.json) (`2024-06-28T13:15:03.453`)
|
||||
- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-06-28T13:15:19.317`)
|
||||
- [CVE-2010-0738](CVE-2010/CVE-2010-07xx/CVE-2010-0738.json) (`2024-06-28T17:29:24.133`)
|
||||
- [CVE-2010-0840](CVE-2010/CVE-2010-08xx/CVE-2010-0840.json) (`2024-06-28T17:36:14.617`)
|
||||
- [CVE-2010-1428](CVE-2010/CVE-2010-14xx/CVE-2010-1428.json) (`2024-06-28T17:24:36.643`)
|
||||
- [CVE-2012-1710](CVE-2012/CVE-2012-17xx/CVE-2012-1710.json) (`2024-06-28T17:24:50.570`)
|
||||
- [CVE-2013-0074](CVE-2013/CVE-2013-00xx/CVE-2013-0074.json) (`2024-06-28T17:26:06.253`)
|
||||
- [CVE-2013-3896](CVE-2013/CVE-2013-38xx/CVE-2013-3896.json) (`2024-06-28T17:26:01.240`)
|
||||
- [CVE-2013-3993](CVE-2013/CVE-2013-39xx/CVE-2013-3993.json) (`2024-06-28T17:38:08.727`)
|
||||
- [CVE-2014-0546](CVE-2014/CVE-2014-05xx/CVE-2014-0546.json) (`2024-06-28T17:28:59.517`)
|
||||
- [CVE-2014-2817](CVE-2014/CVE-2014-28xx/CVE-2014-2817.json) (`2024-06-28T17:29:38.427`)
|
||||
- [CVE-2014-4077](CVE-2014/CVE-2014-40xx/CVE-2014-4077.json) (`2024-06-28T17:28:11.117`)
|
||||
- [CVE-2014-4123](CVE-2014/CVE-2014-41xx/CVE-2014-4123.json) (`2024-06-28T17:25:19.543`)
|
||||
- [CVE-2014-4148](CVE-2014/CVE-2014-41xx/CVE-2014-4148.json) (`2024-06-28T17:24:23.353`)
|
||||
- [CVE-2015-1671](CVE-2015/CVE-2015-16xx/CVE-2015-1671.json) (`2024-06-28T17:26:19.513`)
|
||||
- [CVE-2015-2425](CVE-2015/CVE-2015-24xx/CVE-2015-2425.json) (`2024-06-28T17:22:23.857`)
|
||||
- [CVE-2015-4495](CVE-2015/CVE-2015-44xx/CVE-2015-4495.json) (`2024-06-28T17:23:00.030`)
|
||||
- [CVE-2022-1227](CVE-2022/CVE-2022-12xx/CVE-2022-1227.json) (`2024-06-28T16:15:03.017`)
|
||||
- [CVE-2023-3079](CVE-2023/CVE-2023-30xx/CVE-2023-3079.json) (`2024-06-28T16:17:01.657`)
|
||||
- [CVE-2023-3454](CVE-2023/CVE-2023-34xx/CVE-2023-3454.json) (`2024-06-28T16:15:03.207`)
|
||||
- [CVE-2023-49115](CVE-2023/CVE-2023-491xx/CVE-2023-49115.json) (`2024-06-28T17:15:03.173`)
|
||||
- [CVE-2023-5973](CVE-2023/CVE-2023-59xx/CVE-2023-5973.json) (`2024-06-28T16:15:03.353`)
|
||||
- [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-06-28T16:15:03.453`)
|
||||
- [CVE-2024-2859](CVE-2024/CVE-2024-28xx/CVE-2024-2859.json) (`2024-06-28T16:15:04.067`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
447
_state.csv
447
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user