From 08d0675f3f9e369423cc5a1e6b1fda8c49febee3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 21 Jan 2024 03:00:29 +0000 Subject: [PATCH] Auto-Update: 2024-01-21T03:00:25.397703+00:00 --- CVE-2002/CVE-2002-13xx/CVE-2002-1372.json | 161 ++++--- CVE-2003/CVE-2003-10xx/CVE-2003-1013.json | 176 ++++---- CVE-2005/CVE-2005-32xx/CVE-2005-3274.json | 473 ++++++-------------- CVE-2006/CVE-2006-29xx/CVE-2006-2916.json | 179 +++++++- CVE-2008/CVE-2008-45xx/CVE-2008-4577.json | 438 +++++++----------- CVE-2008/CVE-2008-71xx/CVE-2008-7109.json | 63 ++- CVE-2010/CVE-2010-02xx/CVE-2010-0211.json | 184 +++++++- CVE-2011/CVE-2011-25xx/CVE-2011-2520.json | 146 +++--- CVE-2012/CVE-2012-09xx/CVE-2012-0911.json | 200 +++------ CVE-2012/CVE-2012-20xx/CVE-2012-2055.json | 52 ++- CVE-2012/CVE-2012-35xx/CVE-2012-3527.json | 237 ++-------- CVE-2017/CVE-2017-69xx/CVE-2017-6964.json | 19 +- CVE-2019/CVE-2019-107xx/CVE-2019-10744.json | 28 +- CVE-2020/CVE-2020-175xx/CVE-2020-17533.json | 16 +- CVE-2020/CVE-2020-60xx/CVE-2020-6078.json | 2 +- CVE-2020/CVE-2020-82xx/CVE-2020-8203.json | 2 +- CVE-2021/CVE-2021-392xx/CVE-2021-39231.json | 5 +- CVE-2021/CVE-2021-436xx/CVE-2021-43675.json | 6 +- CVE-2022/CVE-2022-03xx/CVE-2022-0396.json | 10 +- CVE-2022/CVE-2022-10xx/CVE-2022-1048.json | 10 +- CVE-2022/CVE-2022-18xx/CVE-2022-1816.json | 9 +- CVE-2022/CVE-2022-436xx/CVE-2022-43680.json | 52 ++- CVE-2022/CVE-2022-43xx/CVE-2022-4330.json | 20 +- CVE-2023/CVE-2023-323xx/CVE-2023-32359.json | 10 +- CVE-2023/CVE-2023-385xx/CVE-2023-38527.json | 22 +- CVE-2023/CVE-2023-385xx/CVE-2023-38545.json | 66 ++- CVE-2023/CVE-2023-393xx/CVE-2023-39325.json | 203 +++++++-- CVE-2023/CVE-2023-407xx/CVE-2023-40745.json | 14 +- CVE-2023/CVE-2023-416xx/CVE-2023-41614.json | 9 +- CVE-2023/CVE-2023-419xx/CVE-2023-41900.json | 21 +- CVE-2023/CVE-2023-419xx/CVE-2023-41983.json | 81 +++- CVE-2023/CVE-2023-419xx/CVE-2023-41993.json | 4 +- CVE-2023/CVE-2023-425xx/CVE-2023-42548.json | 4 +- CVE-2023/CVE-2023-443xx/CVE-2023-44387.json | 9 +- CVE-2023/CVE-2023-444xx/CVE-2023-44466.json | 9 +- CVE-2023/CVE-2023-447xx/CVE-2023-44760.json | 22 +- CVE-2023/CVE-2023-451xx/CVE-2023-45145.json | 19 +- CVE-2023/CVE-2023-47xx/CVE-2023-4732.json | 59 ++- CVE-2023/CVE-2023-48xx/CVE-2023-4813.json | 164 ++++++- CVE-2023/CVE-2023-51xx/CVE-2023-5139.json | 21 +- CVE-2023/CVE-2023-53xx/CVE-2023-5380.json | 50 ++- CVE-2023/CVE-2023-54xx/CVE-2023-5408.json | 34 +- README.md | 38 +- 43 files changed, 1925 insertions(+), 1422 deletions(-) diff --git a/CVE-2002/CVE-2002-13xx/CVE-2002-1372.json b/CVE-2002/CVE-2002-13xx/CVE-2002-1372.json index f55af159632..77aaba4d36d 100644 --- a/CVE-2002/CVE-2002-13xx/CVE-2002-1372.json +++ b/CVE-2002/CVE-2002-13xx/CVE-2002-1372.json @@ -2,8 +2,8 @@ "id": "CVE-2002-1372", "sourceIdentifier": "cve@mitre.org", "published": "2002-12-26T05:00:00.000", - "lastModified": "2017-10-10T01:30:11.767", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:39:35.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-252" } ] } @@ -62,68 +84,30 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "68BD578F-CCAD-4515-9205-EB4F297C6DB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", - "matchCriteriaId": "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "734D0C2C-F71F-461A-87EE-202C6B706753" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F0F402D-5CD0-4477-8B59-C753CECB02BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", - "matchCriteriaId": "959F7AFA-ED20-434C-993F-06C2A8574662" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", - "matchCriteriaId": "D4F5A0A4-2884-46CA-A846-8B954EB80CFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35E65857-12C7-49DE-AD27-3CACD456231C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "47CEF035-57A6-470B-916A-E5562C28E866" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "D414984E-4F6B-4278-8346-968587E4B18E" - }, + "criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.14", + "versionEndIncluding": "1.1.17", + "matchCriteriaId": "BB349B56-37FA-4ECB-8260-AFBF6B324B34" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", - "matchCriteriaId": "33C36DCB-2FDD-44E6-85E8-875575AAE69E" + "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", - "matchCriteriaId": "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF" + "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935" } ] } @@ -137,13 +121,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83" + "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935" + "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3" } ] } @@ -153,47 +137,78 @@ "references": [ { "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://marc.info/?l=bugtraq&m=104032149026670&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.debian.org/security/2003/dsa-232", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.idefense.com/advisory/12.19.02.txt", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", "Vendor Advisory" ] }, { "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/6440", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10912", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json b/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json index 2583cc578bb..42644ff3197 100644 --- a/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json +++ b/CVE-2003/CVE-2003-10xx/CVE-2003-1013.json @@ -2,8 +2,8 @@ "id": "CVE-2003-1013", "sourceIdentifier": "cve@mitre.org", "published": "2004-01-05T05:00:00.000", - "lastModified": "2017-10-11T01:29:17.323", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:26:54.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-476" } ] } @@ -62,88 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "83C48EC3-D0BA-4A5D-93B0-6931CB3587AB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "CB461B6B-B731-4732-AAD0-191BE50189D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "19961880-D38A-4785-A7C5-879A061119BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "831705D2-C4DE-475F-B908-8859064AFB38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A4622585-20E2-46E9-B773-74729FF22EEB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E86ADCB6-0940-4CB9-85F1-A7694210FB66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "042B6289-D2E2-4369-BB40-EA6EE7025D23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "C93D7B7E-F5F9-44A2-A87B-4A16634DEDAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "F0A48938-30B8-4403-B08A-177FFCB9054B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "C9A33AA4-CABF-4B6B-8688-8C1BD36D6649" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "67B81EFD-27C1-411C-AFF3-E5340627E3BA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "680934CF-7F9B-41E4-AA03-ECD96F477AB9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*", - "matchCriteriaId": "6F1F3D3E-A6D6-4C1A-8BC6-5579C19A7A45" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*", - "matchCriteriaId": "3BCF3AFF-ED4D-40F6-A2DD-04C0A6D3BD64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*", - "matchCriteriaId": "DBCCE368-64E6-4CEC-B068-9B8BA2527289" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5374A4-5194-45FD-895D-B04FDC7E853C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*", - "matchCriteriaId": "4038BC6D-DE51-4F1C-A25C-CD7FC6CE8CF6" + "criteria": "cpe:2.3:a:ethereal:ethereal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.10.0", + "matchCriteriaId": "02FAC872-0676-4E29-A6F5-BA0EBFE826E9" } ] } @@ -153,51 +96,98 @@ "references": [ { "url": "ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000801", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/10531", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/10568", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/10570", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2003/dsa-407", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.ethereal.com/appnotes/enpa-sa-00012.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:002", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-001.html", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Patch", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2004-002.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10097", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A857", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2005/CVE-2005-32xx/CVE-2005-3274.json b/CVE-2005/CVE-2005-32xx/CVE-2005-3274.json index 6de71e6b5d1..87631e5eb51 100644 --- a/CVE-2005/CVE-2005-32xx/CVE-2005-3274.json +++ b/CVE-2005/CVE-2005-32xx/CVE-2005-3274.json @@ -2,8 +2,8 @@ "id": "CVE-2005-3274", "sourceIdentifier": "cve@mitre.org", "published": "2005-10-21T01:02:00.000", - "lastModified": "2023-11-07T01:57:49.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:26:05.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -44,7 +66,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-476" } ] } @@ -58,323 +80,32 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.4.0", + "versionEndIncluding": "2.4.31", + "matchCriteriaId": "C9E64153-4A9A-448A-9654-5C79B4C86646" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "476687F9-722B-490C-BD0B-B5F2CD7891DC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "A399D94B-D08D-4454-A07A-6634C9AE612F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "040991B8-FB4B-480B-B53B-AA7A884F9F19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "59688C40-C92F-431E-ADD7-6782622862D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "E120257D-346B-4BA6-A431-E6F820FBB5FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "361D407D-A4BE-491D-BC8E-32E78DC4A8F0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "A3CD7983-4EB2-4D17-9332-493ECBADC284" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "550DFE6E-DCE6-4649-8746-522996021DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", - "matchCriteriaId": "1FC53528-A67F-42DF-B8DA-778A65893F9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", - "matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", - "matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7936B7EE-9CD1-4698-AD67-C619D0171A88" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", - "matchCriteriaId": "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", - "matchCriteriaId": "5738D628-0B2D-4F56-9427-2009BFCB6C11" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F43EBCB4-FCF4-479A-A44D-D913F7F09C77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", - "matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", - "matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70" - }, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.6.13", + "matchCriteriaId": "43EDD335-A1D2-46B5-AED5-066CB1127212" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3" + "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" } ] } @@ -384,83 +115,155 @@ "references": [ { "url": "http://lkml.org/lkml/2005/6/23/249", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://lkml.org/lkml/2005/6/24/173", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "http://secunia.com/advisories/17826", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/18056", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/18684", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://secunia.com/advisories/18977", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.debian.org/security/2005/dsa-922", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/15528", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://usn.ubuntu.com/219-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2006/CVE-2006-29xx/CVE-2006-2916.json b/CVE-2006/CVE-2006-29xx/CVE-2006-2916.json index 2c972ecce98..9ab25ee2ecf 100644 --- a/CVE-2006/CVE-2006-29xx/CVE-2006-2916.json +++ b/CVE-2006/CVE-2006-29xx/CVE-2006-2916.json @@ -2,9 +2,9 @@ "id": "CVE-2006-2916", "sourceIdentifier": "cve@mitre.org", "published": "2006-06-15T10:02:00.000", - "lastModified": "2018-10-18T16:43:41.043", - "vulnStatus": "Modified", - "evaluatorSolution": "Product is only vulnerable when running setuid root on Linux 2.6.0 or later versions.\r\nVendor links provide patches for each affected version.", + "lastModified": "2024-01-21T01:42:33.730", + "vulnStatus": "Analyzed", + "evaluatorSolution": "Product is only vulnerable when running setuid root on Linux 2.6.0 or later versions.\nVendor links provide patches for each affected version.", "descriptions": [ { "lang": "en", @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -56,13 +78,14 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-273" } ] } ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -79,6 +102,18 @@ "matchCriteriaId": "EC2D979D-0731-4CE3-9D16-22EF314884A2" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.0", + "matchCriteriaId": "DC4FB0A3-C8CC-4AB5-8A9D-EF370368B1EB" + } + ] } ] } @@ -88,28 +123,100 @@ "url": "http://dot.kde.org/1150310128/", "source": "cve@mitre.org", "tags": [ - "Patch" + "Not Applicable" ] }, { "url": "http://mail.gnome.org/archives/beast/2006-December/msg00025.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/20677", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20786", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20827", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20868", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/20899", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/25032", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/25059", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200704-22.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://securitytracker.com/id?1016298", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.kde.org/info/security/advisory-20060614-2.txt", @@ -121,38 +228,74 @@ }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:107", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.novell.com/linux/security/advisories/2006_38_security.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/26506", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/437362/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/18429", "source": "cve@mitre.org", "tags": [ - "Patch" + "Broken Link", + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securityfocus.com/bid/23697", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vupen.com/english/advisories/2006/2357", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.vupen.com/english/advisories/2007/0409", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27221", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-45xx/CVE-2008-4577.json b/CVE-2008/CVE-2008-45xx/CVE-2008-4577.json index 6fd44706a98..67905d6c5e9 100644 --- a/CVE-2008/CVE-2008-45xx/CVE-2008-4577.json +++ b/CVE-2008/CVE-2008-45xx/CVE-2008-4577.json @@ -2,8 +2,8 @@ "id": "CVE-2008-4577", "sourceIdentifier": "secalert@redhat.com", "published": "2008-10-15T20:08:02.670", - "lastModified": "2017-09-29T01:32:13.663", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:46:56.287", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-863" } ] } @@ -63,288 +85,68 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.1.3", - "matchCriteriaId": "13310053-191A-4931-BA90-2D6F8850A7CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:0.99.13:*:*:*:*:*:*:*", - "matchCriteriaId": "D0616CCF-D278-4B6D-A58B-393BCA128CF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:0.99.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D3C7BE64-7C1E-4043-A1C5-D0A7377C01A7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "4240BD98-3C31-42CE-AF8F-045DD4BFC084" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1C05ACA0-ED87-4DDF-94B6-8D25BE1790F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8A8C0C4A-F9DB-4BB7-BFC5-BEC22C3FE40B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B7E00B56-A1E5-4261-8349-37654AA9FB64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E66427AA-A9D4-413F-8354-EA61407307C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D74BE6C7-114D-4885-8472-FFE71C817B8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "4A349510-4D00-4978-93D9-3F9F5E0CD8DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B65B9EFD-1531-463C-992E-F0F16AABF9C3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "34BA7146-5793-44F4-9569-9D868FE6E325" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B5078363-6B42-491B-A219-F8D8A86132BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "B1DDF093-B5C7-4AE5-B3D6-466C543AB2BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta1:*:*:*:*:*:*:*", - "matchCriteriaId": "C9FBEF6C-4A09-4661-BED0-8B5BC8BAF1AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta2:*:*:*:*:*:*:*", - "matchCriteriaId": "9D680474-C329-4DD0-B4EA-2406E27EC474" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta3:*:*:*:*:*:*:*", - "matchCriteriaId": "165A0D0B-C6B0-431F-BF36-223A27CD6A42" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta4:*:*:*:*:*:*:*", - "matchCriteriaId": "92FB54D3-F856-4027-8AAF-6B05AE17D520" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta5:*:*:*:*:*:*:*", - "matchCriteriaId": "34759794-747B-4770-8DB5-4E07AA8A15AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta6:*:*:*:*:*:*:*", - "matchCriteriaId": "8D5AF2A0-3289-47FA-B8DB-D5E28504F012" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta7:*:*:*:*:*:*:*", - "matchCriteriaId": "99268D48-CF82-450B-A033-D87AF4109531" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta8:*:*:*:*:*:*:*", - "matchCriteriaId": "B2E09737-8107-45C0-BFF1-FB4CF81564CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.beta9:*:*:*:*:*:*:*", - "matchCriteriaId": "280BE28D-B8A8-4E76-BC96-DB756C00B994" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc1:*:*:*:*:*:*:*", - "matchCriteriaId": "91E74D81-DF10-423A-8549-3BB5ED02B5A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc2:*:*:*:*:*:*:*", - "matchCriteriaId": "07D6853E-7E81-443D-8806-C8469217F55C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc3:*:*:*:*:*:*:*", - "matchCriteriaId": "D1BE4B6A-47A2-457B-B6B8-8FE5C2026A11" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc4:*:*:*:*:*:*:*", - "matchCriteriaId": "7382F655-9B27-443D-9397-346FBEADEFDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc5:*:*:*:*:*:*:*", - "matchCriteriaId": "6F180045-A0DA-40A3-AD3E-F3402FB6456A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc6:*:*:*:*:*:*:*", - "matchCriteriaId": "C1A2FFE7-D008-47B4-80E7-AEC176918E06" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc7:*:*:*:*:*:*:*", - "matchCriteriaId": "8C840337-7B31-476B-BBCD-65F4899925E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc8:*:*:*:*:*:*:*", - "matchCriteriaId": "545EF2F5-9BAE-4612-9958-70A5413818A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc9:*:*:*:*:*:*:*", - "matchCriteriaId": "E80096F8-46D9-42E3-8CDB-99ADA2CBD970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc10:*:*:*:*:*:*:*", - "matchCriteriaId": "9E504866-3429-4A4C-8278-5C2753D356C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc11:*:*:*:*:*:*:*", - "matchCriteriaId": "30857130-636F-4719-9F1E-8F6369F40DAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc12:*:*:*:*:*:*:*", - "matchCriteriaId": "9843D7CE-4723-4200-AFD4-5B31545A287E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc13:*:*:*:*:*:*:*", - "matchCriteriaId": "54AF1D92-D89B-4DE4-9D47-72466873A4C7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc14:*:*:*:*:*:*:*", - "matchCriteriaId": "64A8FCA5-1666-48F7-9689-37D9315813F7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc15:*:*:*:*:*:*:*", - "matchCriteriaId": "D4D517F3-F0A8-4362-89B9-0ED63515283F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc16:*:*:*:*:*:*:*", - "matchCriteriaId": "23883A94-559B-4655-82D4-F09868235771" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc17:*:*:*:*:*:*:*", - "matchCriteriaId": "520B52BF-FD23-429D-BAA4-E08DB84C82F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc18:*:*:*:*:*:*:*", - "matchCriteriaId": "0B7948AB-2061-4ADB-A01C-3CE8B47CCD19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc19:*:*:*:*:*:*:*", - "matchCriteriaId": "C24F6BFB-AA8C-441A-9026-809183D0350E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc20:*:*:*:*:*:*:*", - "matchCriteriaId": "C22A513A-A94A-4BC4-B5B7-3CCA166C9874" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc21:*:*:*:*:*:*:*", - "matchCriteriaId": "65038654-6B35-4502-BD74-F9F0954C5EF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc22:*:*:*:*:*:*:*", - "matchCriteriaId": "4307AA80-C0AC-4193-8353-D746DBF52FD8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc23:*:*:*:*:*:*:*", - "matchCriteriaId": "0E95BAF5-FC78-4286-B6BD-464E9F08CF9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc24:*:*:*:*:*:*:*", - "matchCriteriaId": "0C6AA8FD-3692-4069-8980-9544044B8CE6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc25:*:*:*:*:*:*:*", - "matchCriteriaId": "F22AADE9-D37D-439B-B934-8DA01A29BB87" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc26:*:*:*:*:*:*:*", - "matchCriteriaId": "4ECCD893-A5EE-4696-80AA-FD9092548BDA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc27:*:*:*:*:*:*:*", - "matchCriteriaId": "0B960D71-04E5-45F7-8DC2-45C341673FB5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0.rc28:*:*:*:*:*:*:*", - "matchCriteriaId": "658E275E-8C2C-46EE-850A-14ADBD097E0F" - }, + "versionEndExcluding": "1.1.4", + "matchCriteriaId": "B084417D-FA5E-45DE-AA03-3932D9292B30" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.0_rc29:*:*:*:*:*:*:*", - "matchCriteriaId": "3AAE9E7C-49CC-48C3-B47C-CDC5802356A7" + "criteria": "cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*", + "matchCriteriaId": "72E4DB7F-07C3-46BB-AAA2-05CD0312C57F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F8BE860F-A3C2-43E0-BC75-503C437DAADD" - }, + "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", + "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "9E6F249C-2793-46B5-A9E2-5EB3A62FF8E4" - }, + "criteria": "cpe:2.3:o:opensuse:opensuse:10.3-11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F7018930-D354-4B31-870E-D0E3CE19C8B5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E4E57B06-8650-4374-B643-6FCBE3ABDAF5" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", + "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B0384E42-1506-4C08-AA5A-18B2A711C7F0" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:dovecot:dovecot:1.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F5DC1CE5-50B9-426E-B98A-224DC499AB15" + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", + "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB" } ] } @@ -354,54 +156,126 @@ "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=240409", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/32164", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/32471", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/33149", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/33624", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/36904", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-200812-16.xml", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.dovecot.org/list/dovecot-news/2008-October/000085.html", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Mailing List", + "Release Notes" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:232", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-0205.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/bid/31587", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-838-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2008/2745", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10376", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00816.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00844.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2008/CVE-2008-71xx/CVE-2008-7109.json b/CVE-2008/CVE-2008-71xx/CVE-2008-7109.json index 74616503417..9170162a4ee 100644 --- a/CVE-2008/CVE-2008-71xx/CVE-2008-7109.json +++ b/CVE-2008/CVE-2008-71xx/CVE-2008-7109.json @@ -2,8 +2,8 @@ "id": "CVE-2008-7109", "sourceIdentifier": "cve@mitre.org", "published": "2009-08-28T15:30:00.280", - "lastModified": "2018-10-11T20:58:19.363", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:41:31.543", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-863" } ] } @@ -71,31 +93,56 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31631", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, { "url": "http://www.informit.com/guides/content.aspx?g=security&seqNum=320", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Not Applicable" ] }, { "url": "http://www.securityfocus.com/archive/1/495772/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/30855", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link", + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44717", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53004", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0211.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0211.json index a27f29347d9..df55483a1a8 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0211.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0211.json @@ -2,8 +2,8 @@ "id": "CVE-2010-0211", "sourceIdentifier": "cret@cert.org", "published": "2010-07-28T12:48:51.620", - "lastModified": "2018-10-10T19:51:28.353", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:35:50.483", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-252" } ] } @@ -68,28 +90,133 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "13771B15-CD71-472A-BE56-718B87D5825D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDE707D-A1F4-4829-843E-F6633BB84D6D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.5", + "matchCriteriaId": "5BB1D490-FDFB-468C-942D-0BC828B5D3F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0", + "versionEndExcluding": "10.6.5", + "matchCriteriaId": "65FA6685-8E50-40CA-A61D-649AECC5F48F" + } + ] + } + ] } ], "references": [ { "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/40639", + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/40677", + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/40687", + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/42787", + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://support.apple.com/kb/HT4435", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570", @@ -100,36 +227,59 @@ }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0542.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2010-0543.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.securityfocus.com/archive/1/515545/100/0/threaded", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/41770", "source": "cret@cert.org", "tags": [ + "Broken Link", "Exploit", - "Patch" + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securitytracker.com/id?1024221", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.vmware.com/security/advisories/VMSA-2011-0001.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.vupen.com/english/advisories/2010/1849", "source": "cret@cert.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, @@ -137,12 +287,16 @@ "url": "http://www.vupen.com/english/advisories/2010/1858", "source": "cret@cert.org", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2011/0025", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2011/CVE-2011-25xx/CVE-2011-2520.json b/CVE-2011/CVE-2011-25xx/CVE-2011-2520.json index b3b3e1bb30d..bfb5864741a 100644 --- a/CVE-2011/CVE-2011-25xx/CVE-2011-2520.json +++ b/CVE-2011/CVE-2011-25xx/CVE-2011-2520.json @@ -2,8 +2,8 @@ "id": "CVE-2011-2520", "sourceIdentifier": "secalert@redhat.com", "published": "2011-07-21T23:55:03.410", - "lastModified": "2023-02-13T04:31:08.127", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:53:02.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-264" + "value": "CWE-502" } ] } @@ -65,76 +87,21 @@ "criteria": "cpe:2.3:a:redhat:system-config-firewall:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.2.29", "matchCriteriaId": "B027AFED-619C-4E1B-ABD8-585B92170F97" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "7A561AAE-876E-4F87-884B-743F8A8D6C0F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "071E4AC3-9519-4785-8DBF-025409139F2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "E2093640-9DEE-479F-884D-9757507B57AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2FC40C82-2458-4F9A-94CA-5CB57F109CA8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "E645DE7A-2019-4E3D-8FD1-FB0087DC1ACA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "5457FEA9-EFE9-4F10-8E46-03228F3819C9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "28A97EFD-60B1-4939-99E0-29807A4EF059" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "BBF87C26-86FB-4497-8045-D3BE6A1ECA65" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B9FA4CC8-C8EE-4064-B965-D6D9A30942B4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "3C338E02-B841-4537-8FEB-E57CDB7956B0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "A6348420-46EE-428F-BAAA-97AE0624C7BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "71612D3A-D015-4EC0-9610-213022DC7E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "537A4089-9CA1-4DEB-BCBE-8FDFBD087613" - }, + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:system-config-firewall:1.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "697CA9B1-2446-4B11-9F6B-35925783CA88" + "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", + "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D" } ] } @@ -144,37 +111,60 @@ "references": [ { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063314.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://secunia.com/advisories/45294", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://securitytracker.com/id?1025793", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2011/07/18/6", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Mailing List" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2011-0953.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.securityfocus.com/bid/48715", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=717985", "source": "secalert@redhat.com", "tags": [ - "Patch" + "Issue Tracking" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68734", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0911.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0911.json index 8cd5feef00e..18a93765c5f 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0911.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0911.json @@ -2,8 +2,8 @@ "id": "CVE-2012-0911", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T19:55:03.530", - "lastModified": "2017-08-29T01:31:06.053", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:50:35.533", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-502" } ] } @@ -62,145 +84,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:-:lts:*:*:*:*:*", - "versionEndIncluding": "6.5", - "matchCriteriaId": "B76DBC3C-9B10-462F-9C05-6F7B04E967A8" + "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "6.7", + "matchCriteriaId": "6A1D9B8A-FAED-4172-974B-9DCAB5FA50A7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.3:-:lts:*:*:*:*:*", - "matchCriteriaId": "184741CA-D25B-493C-B9E5-8CBF3A9A63DE" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.3", - "matchCriteriaId": "924613EB-55F2-4739-9882-9776D9AACB36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A5160514-D8C3-458A-B3A6-24CD4FB96BD2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "481CEC51-C828-4AB7-9745-824B5D529D40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DD3F664D-C59E-4033-805B-BB3C85528091" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "457AEABE-F6C1-459A-883E-4D4F0DD8D441" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4401BA0E-5F63-405C-8C42-C2E1E4C45306" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "69930A94-2008-4259-B2BE-BD159B1FD6FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "1A4DB362-E012-4A97-8EA4-9589D2811C3C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "03BE8241-0A3F-48E5-9917-D22CC187F650" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "DC898854-88D0-44F7-A742-30956E99F879" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "69CBF74D-A845-4461-8673-B3616339BD23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "74F3472D-158E-439A-BBAA-9DB8677C97B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "197A8FDC-2474-4FB8-80E1-10A898D4CDCD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "395EC051-76D6-43AA-822D-4E3A65A714EC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "EC0F2A72-FF54-4CB6-8456-35AC90945720" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "DEA7EADB-82F1-4A28-8AF8-17F6BCFD4E23" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "72AE1516-6085-4505-93EF-AFC8B7FEB357" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "07C509BE-1B02-441E-9CA2-E568B39976DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "856C2298-D9AB-4947-B7A2-5457F7BA3BDB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "7F91FDFE-D9F0-4839-B5A5-4F6400F2880A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "0FB6C008-CC5D-4EBF-A2DF-688840C45FEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5EB2F4E7-FC71-4DB5-BDC4-9069E20C5C9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C7D956F1-3C55-4F30-B1E0-33C3E835BF26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4D339401-2443-467E-A57C-685A44630B4F" + "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:-:*:*:*", + "versionEndExcluding": "8.4", + "matchCriteriaId": "D2ADB014-8549-4F8B-8B6D-1FD34D85DD40" } ] } @@ -219,48 +111,62 @@ "url": "http://dev.tiki.org/item4109", "source": "cve@mitre.org", "tags": [ - "Patch", - "Vendor Advisory" + "Broken Link" ] }, { "url": "http://info.tiki.org/article190-Tiki-Wiki-CMS-Groupware-Updates-Tiki-6-7-LTS", "source": "cve@mitre.org", "tags": [ - "Patch" + "Vendor Advisory" ] }, { "url": "http://info.tiki.org/article191-Tiki-Releases-8-4", "source": "cve@mitre.org", "tags": [ - "Patch" + "Release Notes" + ] + }, + { + "url": "http://osvdb.org/83534", + "source": "cve@mitre.org", + "tags": [ + "Broken Link" ] }, { "url": "http://www.exploit-db.com/exploits/19573", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.exploit-db.com/exploits/19630", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "http://www.securityfocus.com/bid/54298", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Broken Link" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76758", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json index 93e1fb440a5..1b2581f6cd4 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json @@ -2,8 +2,8 @@ "id": "CVE-2012-2055", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-05T14:55:06.107", - "lastModified": "2017-12-20T02:29:01.257", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:39:05.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-255" + "value": "CWE-913" } ] } @@ -62,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:github:github_enterprise:*:*:*:*:*:*:*:*", - "versionEndIncluding": "20120303", - "matchCriteriaId": "B4B3B4A1-3DE4-4D83-99FA-0601EF435206" + "criteria": "cpe:2.3:a:github:github:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "20120304", + "matchCriteriaId": "C0048D8D-869E-4A8F-BB33-7E603967222D" } ] } @@ -76,20 +98,30 @@ "url": "http://homakov.blogspot.com/2012/03/how-to.html", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Issue Tracking" ] }, { "url": "http://lwn.net/Articles/488702/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74812", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/blog/1068-public-key-security-vulnerability-and-mitigation", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json index ac7a9e2469f..9687353f0a2 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json @@ -2,8 +2,8 @@ "id": "CVE-2012-3527", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:01.880", - "lastModified": "2017-08-29T01:31:57.007", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:47:51.273", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,7 +48,7 @@ "description": [ { "lang": "en", - "value": "CWE-310" + "value": "CWE-502" } ] } @@ -62,178 +62,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9788D5CD-FEAA-4D07-8252-4176AD0BC0C3" + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.5.19", + "matchCriteriaId": "22CA92CF-92AF-4EFE-A391-0EAFB2F0FD4C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6523E669-DD41-4A28-A4D4-83CC8BE0143B" + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.6.0", + "versionEndExcluding": "4.6.12", + "matchCriteriaId": "023FE42D-3819-4759-8EAF-C94DEAA6BC0B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "868534F5-9CEE-48F8-BD2F-EDD8F9F5D302" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3AD9A9F1-28EA-4B39-9D2D-74E7F86B1355" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4D2B855F-5281-4DE6-A3C2-F579FDE5FD60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "4F773E8B-F81C-4A04-8A78-0576CB899A43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D2B48937-411B-468D-B35C-73BA0DCE7A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "867200CE-C689-4E6F-9D56-565B6D841494" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E3EDD9F0-BBE2-4A79-B1A1-6CD31939A5EE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1AAEAFB6-4FA3-4586-A7D6-ED269433220A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*", - "matchCriteriaId": "FDDAE81E-15AD-4C1D-8989-9EFA6445885F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*", - "matchCriteriaId": "D451E97C-061F-43D3-B3B3-FD46C694C934" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*", - "matchCriteriaId": "5E8DF53F-3E5A-485E-8430-348207EBFF81" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*", - "matchCriteriaId": "BC68F0F3-89BC-4398-95EE-6358094B284B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*", - "matchCriteriaId": "28352CAB-EF6C-43DC-9487-202151B18612" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*", - "matchCriteriaId": "635C90E5-BBCE-4662-BC16-4F04FCE04785" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*", - "matchCriteriaId": "32D324F6-E73B-4F54-A4B1-431550C08341" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "96AC3681-104E-4A33-B9F7-F648DB4B8193" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*", - "matchCriteriaId": "8FE92575-D6F5-4304-8347-19E75EA35331" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F1954F5-A6EF-4A95-976E-5295197EEB2F" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4D42D56A-2A1D-4FAA-961D-304E916BEF80" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "88CBAAC7-5207-45E8-86D5-18D98259070D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "5FAAF258-882A-46AE-B32C-7569A79C1DAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB6F1E7-351D-45E7-9571-2AF4283080DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D2B3B4A9-BDC7-4426-98FB-398B63AF3D18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0016A078-1291-4281-BA62-5A846AEE7584" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F11DB8A8-8309-4FC9-BA35-1AFFC5B4AE8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "9661D2DB-F24C-478B-B691-303D48D9B158" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1F1FD6B9-7FAC-4508-962A-99AF63EB4B36" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "14369AD5-2622-4530-BCD5-A95C032CE4CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D7CBAD29-18E9-4097-88FA-4D287A9A877A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "9F5144AE-E076-48B5-9EA3-2F0BEC34D92F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "46246047-B415-437A-AC0E-2A7157D47C17" + "criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7.0", + "versionEndExcluding": "4.7.4", + "matchCriteriaId": "8ED1BE21-919F-4F2C-A405-1493E905DB25" } ] } @@ -247,28 +93,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "0F1A90BF-E780-4282-BCCB-0E568EB785A2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "36FFBD83-F3FE-4913-8578-98F27E39A73C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A3AA3E69-C22E-463C-837F-42EE6B59E350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "082BD28F-5FEE-4D25-98CF-27513DBF0E39" + "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "86F5F3DD-55D7-4028-A228-2A737A51FDE1" + "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA" } ] } @@ -276,6 +107,20 @@ } ], "references": [ + { + "url": "http://osvdb.org/84773", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/50287", + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] + }, { "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/", "source": "secalert@redhat.com", @@ -285,15 +130,25 @@ }, { "url": "http://www.debian.org/security/2012/dsa-2537", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77791", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-69xx/CVE-2017-6964.json b/CVE-2017/CVE-2017-69xx/CVE-2017-6964.json index 4eb3fa3ff08..6ece9abf299 100644 --- a/CVE-2017/CVE-2017-69xx/CVE-2017-6964.json +++ b/CVE-2017/CVE-2017-69xx/CVE-2017-6964.json @@ -2,8 +2,8 @@ "id": "CVE-2017-6964", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-28T01:59:01.287", - "lastModified": "2019-10-03T00:03:26.223", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:37:24.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -125,12 +125,16 @@ "references": [ { "url": "http://www.debian.org/security/2017/dsa-3823", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/97154", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -139,6 +143,7 @@ "url": "https://launchpad.net/bugs/1673627", "source": "cve@mitre.org", "tags": [ + "Issue Tracking", "Third Party Advisory" ] }, @@ -146,7 +151,7 @@ "url": "https://www.debian.org/security/2017/dsa-3823", "source": "nvd@nist.gov", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { diff --git a/CVE-2019/CVE-2019-107xx/CVE-2019-10744.json b/CVE-2019/CVE-2019-107xx/CVE-2019-10744.json index b4c267e2a67..5f836cf7b31 100644 --- a/CVE-2019/CVE-2019-107xx/CVE-2019-10744.json +++ b/CVE-2019/CVE-2019-107xx/CVE-2019-10744.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10744", "sourceIdentifier": "report@snyk.io", "published": "2019-07-26T00:15:11.217", - "lastModified": "2023-11-07T03:02:32.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T02:45:24.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-1321" } ] } @@ -98,6 +98,21 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", + "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*", @@ -683,12 +698,16 @@ }, { "url": "https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "source": "report@snyk.io", "tags": [ + "Patch", "Third Party Advisory" ] }, @@ -696,6 +715,7 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "source": "report@snyk.io", "tags": [ + "Patch", "Third Party Advisory" ] } diff --git a/CVE-2020/CVE-2020-175xx/CVE-2020-17533.json b/CVE-2020/CVE-2020-175xx/CVE-2020-17533.json index 3bb6ce53f65..9509a83ab31 100644 --- a/CVE-2020/CVE-2020-175xx/CVE-2020-17533.json +++ b/CVE-2020/CVE-2020-175xx/CVE-2020-17533.json @@ -2,8 +2,8 @@ "id": "CVE-2020-17533", "sourceIdentifier": "security@apache.org", "published": "2020-12-29T12:15:12.400", - "lastModified": "2023-11-07T03:19:13.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:30:44.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,12 +70,12 @@ "description": [ { "lang": "en", - "value": "CWE-732" + "value": "CWE-252" } ] }, { - "source": "f0158376-9dc2-43b6-827c-5f631a4d8d09", + "source": "security@apache.org", "type": "Secondary", "description": [ { @@ -120,14 +120,16 @@ }, { "url": "https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cannounce.apache.org%3E", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E", "source": "security@apache.org", "tags": [ - "Mailing List", - "Vendor Advisory" + "Mailing List" ] } ] diff --git a/CVE-2020/CVE-2020-60xx/CVE-2020-6078.json b/CVE-2020/CVE-2020-60xx/CVE-2020-6078.json index 943da7bea49..fd1cc080fa3 100644 --- a/CVE-2020/CVE-2020-60xx/CVE-2020-6078.json +++ b/CVE-2020/CVE-2020-60xx/CVE-2020-6078.json @@ -2,7 +2,7 @@ "id": "CVE-2020-6078", "sourceIdentifier": "talos-cna@cisco.com", "published": "2020-03-24T21:15:14.363", - "lastModified": "2022-04-22T19:05:46.790", + "lastModified": "2024-01-21T01:32:58.980", "vulnStatus": "Analyzed", "descriptions": [ { diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8203.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8203.json index 6d25d0fec1e..c3077d417db 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8203.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8203.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8203", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-15T17:15:11.797", - "lastModified": "2022-05-12T15:01:17.440", + "lastModified": "2024-01-21T02:37:13.193", "vulnStatus": "Analyzed", "descriptions": [ { diff --git a/CVE-2021/CVE-2021-392xx/CVE-2021-39231.json b/CVE-2021/CVE-2021-392xx/CVE-2021-39231.json index 8b6593c62bf..1ea6da60a64 100644 --- a/CVE-2021/CVE-2021-392xx/CVE-2021-39231.json +++ b/CVE-2021/CVE-2021-392xx/CVE-2021-39231.json @@ -2,8 +2,8 @@ "id": "CVE-2021-39231", "sourceIdentifier": "security@apache.org", "published": "2021-11-19T10:15:08.110", - "lastModified": "2023-11-15T09:15:06.787", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:09:10.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -108,6 +108,7 @@ "url": "http://www.openwall.com/lists/oss-security/2021/11/19/2", "source": "security@apache.org", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2021/CVE-2021-436xx/CVE-2021-43675.json b/CVE-2021/CVE-2021-436xx/CVE-2021-43675.json index 61ec8c84355..8b0905f8419 100644 --- a/CVE-2021/CVE-2021-436xx/CVE-2021-43675.json +++ b/CVE-2021/CVE-2021-436xx/CVE-2021-43675.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43675", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-15T16:15:07.557", - "lastModified": "2021-12-17T20:23:58.197", + "lastModified": "2024-01-21T01:25:36.457", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:lycheeorganisation:lychee:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "E3F85EC3-09E6-416C-920B-1D207770D0FE" + "criteria": "cpe:2.3:a:lycheeorg:lychee:3.2.16:*:*:*:*:*:*:*", + "matchCriteriaId": "1BE6E2F8-F617-4621-B87E-30AD0E92C6CC" } ] } diff --git a/CVE-2022/CVE-2022-03xx/CVE-2022-0396.json b/CVE-2022/CVE-2022-03xx/CVE-2022-0396.json index 742cd7e4deb..c9ebe1fb577 100644 --- a/CVE-2022/CVE-2022-03xx/CVE-2022-0396.json +++ b/CVE-2022/CVE-2022-03xx/CVE-2022-0396.json @@ -2,8 +2,8 @@ "id": "CVE-2022-0396", "sourceIdentifier": "security-officer@isc.org", "published": "2022-03-23T11:15:08.380", - "lastModified": "2023-11-09T14:44:33.733", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:05:10.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -414,7 +414,11 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/", - "source": "security-officer@isc.org" + "source": "security-officer@isc.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202210-25", diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1048.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1048.json index 0762a72bd2e..ffd9f4d49fa 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1048.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1048.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1048", "sourceIdentifier": "secalert@redhat.com", "published": "2022-04-29T16:15:08.470", - "lastModified": "2023-11-09T14:44:33.733", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:06:21.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -410,7 +410,11 @@ }, { "url": "https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai%40suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20220629-0001/", diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1816.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1816.json index bc18d9ad90d..448f2118918 100644 --- a/CVE-2022/CVE-2022-18xx/CVE-2022-1816.json +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1816.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1816", "sourceIdentifier": "cna@vuldb.com", "published": "2022-05-23T12:16:16.553", - "lastModified": "2023-11-14T20:19:32.323", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:10:34.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -125,7 +125,10 @@ "references": [ { "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System%28XSS%29.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?id.200558", diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43680.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43680.json index a37589a5217..f358e72c32c 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43680.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43680.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43680", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-24T14:15:53.323", - "lastModified": "2024-01-03T12:15:22.877", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T02:08:05.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -303,11 +303,19 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2023/12/28/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/01/03/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/libexpat/libexpat/issues/649", @@ -349,27 +357,51 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202210-38", diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4330.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4330.json index d2954ea7af5..546a0b64964 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4330.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4330.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4330", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.567", - "lastModified": "2023-11-15T13:45:47.877", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:11:12.100", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,6 +34,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -44,8 +56,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:marcomilesi:wp_attachments:*:*:*:*:*:wordpress:*:*", - "versionEndIncluding": "5.0.5", - "matchCriteriaId": "70B1E3CA-BD96-4C0E-A771-746E4DFE0332" + "versionEndExcluding": "5.0.6", + "matchCriteriaId": "C2B29E15-1282-4C5F-9AC1-ABD460FF6552" } ] } diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json index 6adbeb36e14..e337f732528 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32359", "sourceIdentifier": "product-security@apple.com", "published": "2023-10-25T19:15:09.053", - "lastModified": "2023-11-15T21:15:07.783", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:32:34.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,7 +85,11 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/15/1", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213981", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json index c309e67dd89..9927efa56fd 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38527.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38527", "sourceIdentifier": "productcert@siemens.com", "published": "2023-08-08T10:15:15.923", - "lastModified": "2023-11-14T11:15:10.373", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:59:48.543", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -100,19 +100,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", - "versionStartIncluding": "14.2", - "versionEndExcluding": "14.2.0.6", - "matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232" + "versionStartIncluding": "14.1", + "versionEndExcluding": "14.1.0.11", + "matchCriteriaId": "9EF3388B-D057-4DB9-96AE-B6F4678FE5B8" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:14.1:*:*:*:*:*:*:*", - "matchCriteriaId": "F859B7F9-2AD8-4B2E-9E26-7DEE54160348" + "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.2", + "versionEndExcluding": "14.2.0.6", + "matchCriteriaId": "7E1EFF45-5311-4E89-B736-271EF3C0C232" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:14.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8048B948-FD64-44FA-B5C3-52966997A1A4" + "criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.3", + "versionEndExcluding": "14.3.0.3", + "matchCriteriaId": "99F0D457-7D65-40DC-BCFA-339FA5648709" } ] } diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json index 27c9d6e78f9..786ac792393 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38545", "sourceIdentifier": "support@hackerone.com", "published": "2023-10-18T04:15:11.077", - "lastModified": "2023-11-16T02:15:26.113", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:23:03.223", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,6 +67,51 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" + } + ] + } + ] } ], "references": [ @@ -80,15 +125,26 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20231027-0009/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json index 54b9e92221a..97ff1bca6a9 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39325", "sourceIdentifier": "security@golang.org", "published": "2023-10-11T22:15:09.880", - "lastModified": "2024-01-19T04:15:08.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T02:02:56.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } @@ -96,6 +96,31 @@ "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:astra_trident:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4E44A7B-F32A-43F2-B41A-CB3049100DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:astra_trident_autosupport:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25008095-A75E-4E34-9538-61B6334BB0F9" } ] } @@ -134,27 +159,51 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/", @@ -165,31 +214,59 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/", @@ -200,59 +277,114 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2023-2102", @@ -263,11 +395,18 @@ }, { "url": "https://security.gentoo.org/glsa/202311-09", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0008/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40745.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40745.json index d02998545ca..4af1ca9d9b2 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40745.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40745.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40745", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T19:15:11.260", - "lastModified": "2023-11-10T18:15:08.150", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:56:24.340", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,6 +103,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*", @@ -141,7 +146,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0005/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41614.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41614.json index 4235513d672..915ec141b07 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41614.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41614.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41614", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-21T23:15:09.947", - "lastModified": "2023-11-14T20:19:32.323", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:14:33.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,10 @@ "references": [ { "url": "https://medium.com/%40guravtushar231/stored-xss-in-admin-panel-a38d1feb9ec4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41900.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41900.json index 6690863ee44..f2b0a53aab2 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41900.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41900.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41900", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-15T21:15:11.600", - "lastModified": "2023-11-10T18:15:08.370", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:51:15.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -149,7 +159,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0004/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5507", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json index 1ec8522b168..d2b1163dc06 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41983", "sourceIdentifier": "product-security@apple.com", "published": "2023-10-25T19:15:10.110", - "lastModified": "2023-12-07T20:15:37.887", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T02:35:06.267", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -99,6 +99,51 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] } ], "references": [ @@ -136,19 +181,33 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/15/1", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/en-us/HT213981", @@ -184,11 +243,17 @@ }, { "url": "https://support.apple.com/kb/HT213984", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5557", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json index 5d707321208..8b11d31e513 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41993", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.660", - "lastModified": "2024-01-10T22:15:49.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T02:12:59.973", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42548.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42548.json index 18324c1723c..c7bdecd01f7 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42548.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42548", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-11-07T08:15:21.743", - "lastModified": "2023-11-13T18:18:23.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:57:38.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json index 8ccd585fc70..47c0ebc758c 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44387.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44387", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-05T18:15:12.787", - "lastModified": "2023-11-10T18:15:08.597", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T01:54:43.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -126,7 +126,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0006/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44466.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44466.json index 518230346d0..fced611a545 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44466.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44466.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44466", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-29T06:15:11.007", - "lastModified": "2023-11-16T16:15:31.993", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:16:22.223", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -94,7 +94,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231116-0003/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.spinics.net/lists/ceph-devel/msg57909.html", diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json index 09e9a452be2..aad759061c7 100644 --- a/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44760", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-23T22:15:09.257", - "lastModified": "2023-11-15T22:15:27.730", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:25:40.507", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 5.4, + "baseScore": 4.8, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.3, + "exploitabilityScore": 1.7, "impactScore": 2.7 } ] @@ -70,7 +70,10 @@ "references": [ { "url": "https://github.com/sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes/issues/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes", @@ -82,7 +85,10 @@ }, { "url": "https://www.concretecms.org/about/project-news/security/security-advisory-2023-10-31-concrete-cms-rejects-cve-2023-44760-and-cve-2023-44766", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json index 4eae44ca7ec..243fab7adf3 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45145", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-18T21:15:09.560", - "lastModified": "2023-11-16T15:15:09.813", - "vulnStatus": "Modified", + "lastModified": "2024-01-21T02:30:07.690", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -132,6 +132,11 @@ "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" } ] } @@ -194,11 +199,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20231116-0014/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json index a4b8293fa64..f164065a3a7 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4732.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4732", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-03T17:15:09.853", - "lastModified": "2023-11-28T18:15:09.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T02:17:30.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,10 +103,50 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "93A089E2-D66E-455C-969A-3140D991BAF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:8.0_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "D206176C-6B2B-4BED-A3A2-AE39A41CB3C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "F791F846-7762-40E0-9056-032FD10F2046" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "5A47EF78-A5B6-4B89-8B74-EEB0647C549F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "23D471AC-7DCA-4425-AD91-E5D928753A8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5487EF77-D23A-4CC0-851C-E330B4485D8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "782C86CD-1B68-410A-A096-E5170AD24DA2" } ] } @@ -116,15 +156,24 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:6901", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7077", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7539", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4732", diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json index 45418addf3b..255aea7cf23 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4813", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-12T22:15:08.277", - "lastModified": "2023-11-21T18:15:08.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:49:46.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -171,6 +171,156 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F" + } + ] + } + ] } ], "references": [ @@ -198,7 +348,10 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2023:7409", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4813", @@ -218,7 +371,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231110-0003/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json index 75b138f8a41..95b9d5eaacb 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5139", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2023-10-26T05:15:26.217", - "lastModified": "2023-11-14T03:15:10.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:44:13.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -101,15 +101,26 @@ "references": [ { "url": "http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Nov/1", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/11/07/1", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json index 7432e2c16eb..dad2c3c0983 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5380", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T20:15:18.503", - "lastModified": "2023-11-30T22:15:09.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:38:51.987", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -134,10 +134,20 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" } ] } @@ -167,7 +177,10 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:7428", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5380", @@ -185,19 +198,32 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/", @@ -208,7 +234,10 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", @@ -220,7 +249,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20231130-0004/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5534", diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5408.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5408.json index acb0703ecc0..9cdd06d21b7 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5408.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5408.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5408", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-02T03:15:10.230", - "lastModified": "2023-12-30T12:15:43.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-01-21T01:48:09.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -87,10 +87,25 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "EA983F8C-3A06-450A-AEFF-9429DE9A3454" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "40449571-22F8-44FA-B57B-B43F71AB25E2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*", "matchCriteriaId": "1FFF1D51-ABA8-4E54-B81C-A88C8A5E4842" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "486B3F69-1551-4F8B-B25B-A5864248811B" } ] } @@ -100,7 +115,10 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:5006", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:6130", @@ -111,11 +129,17 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2023:6842", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7479", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5408", diff --git a/README.md b/README.md index 2dbf1fa93ce..66b1136e7af 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-20T23:00:24.678733+00:00 +2024-01-21T03:00:25.397703+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-20T21:15:43.463000+00:00 +2024-01-21T02:59:48.543000+00:00 ``` ### Last Data Feed Release @@ -23,7 +23,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-01-20T01:00:28.246821+00:00 +2024-01-21T01:00:28.268068+00:00 ``` ### Total Number of included CVEs @@ -34,15 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* [CVE-2024-0521](CVE-2024/CVE-2024-05xx/CVE-2024-0521.json) (`2024-01-20T21:15:43.463`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` - +Recently modified CVEs: `42` + +* [CVE-2021-39231](CVE-2021/CVE-2021-392xx/CVE-2021-39231.json) (`2024-01-21T02:09:10.017`) +* [CVE-2022-0396](CVE-2022/CVE-2022-03xx/CVE-2022-0396.json) (`2024-01-21T02:05:10.713`) +* [CVE-2022-1048](CVE-2022/CVE-2022-10xx/CVE-2022-1048.json) (`2024-01-21T02:06:21.707`) +* [CVE-2022-43680](CVE-2022/CVE-2022-436xx/CVE-2022-43680.json) (`2024-01-21T02:08:05.430`) +* [CVE-2022-1816](CVE-2022/CVE-2022-18xx/CVE-2022-1816.json) (`2024-01-21T02:10:34.317`) +* [CVE-2022-4330](CVE-2022/CVE-2022-43xx/CVE-2022-4330.json) (`2024-01-21T02:11:12.100`) +* [CVE-2023-5380](CVE-2023/CVE-2023-53xx/CVE-2023-5380.json) (`2024-01-21T01:38:51.987`) +* [CVE-2023-5139](CVE-2023/CVE-2023-51xx/CVE-2023-5139.json) (`2024-01-21T01:44:13.437`) +* [CVE-2023-5408](CVE-2023/CVE-2023-54xx/CVE-2023-5408.json) (`2024-01-21T01:48:09.767`) +* [CVE-2023-4813](CVE-2023/CVE-2023-48xx/CVE-2023-4813.json) (`2024-01-21T01:49:46.697`) +* [CVE-2023-41900](CVE-2023/CVE-2023-419xx/CVE-2023-41900.json) (`2024-01-21T01:51:15.317`) +* [CVE-2023-44387](CVE-2023/CVE-2023-443xx/CVE-2023-44387.json) (`2024-01-21T01:54:43.317`) +* [CVE-2023-40745](CVE-2023/CVE-2023-407xx/CVE-2023-40745.json) (`2024-01-21T01:56:24.340`) +* [CVE-2023-42548](CVE-2023/CVE-2023-425xx/CVE-2023-42548.json) (`2024-01-21T01:57:38.307`) +* [CVE-2023-39325](CVE-2023/CVE-2023-393xx/CVE-2023-39325.json) (`2024-01-21T02:02:56.727`) +* [CVE-2023-41993](CVE-2023/CVE-2023-419xx/CVE-2023-41993.json) (`2024-01-21T02:12:59.973`) +* [CVE-2023-41614](CVE-2023/CVE-2023-416xx/CVE-2023-41614.json) (`2024-01-21T02:14:33.077`) +* [CVE-2023-44466](CVE-2023/CVE-2023-444xx/CVE-2023-44466.json) (`2024-01-21T02:16:22.223`) +* [CVE-2023-4732](CVE-2023/CVE-2023-47xx/CVE-2023-4732.json) (`2024-01-21T02:17:30.047`) +* [CVE-2023-38545](CVE-2023/CVE-2023-385xx/CVE-2023-38545.json) (`2024-01-21T02:23:03.223`) +* [CVE-2023-44760](CVE-2023/CVE-2023-447xx/CVE-2023-44760.json) (`2024-01-21T02:25:40.507`) +* [CVE-2023-45145](CVE-2023/CVE-2023-451xx/CVE-2023-45145.json) (`2024-01-21T02:30:07.690`) +* [CVE-2023-32359](CVE-2023/CVE-2023-323xx/CVE-2023-32359.json) (`2024-01-21T02:32:34.087`) +* [CVE-2023-41983](CVE-2023/CVE-2023-419xx/CVE-2023-41983.json) (`2024-01-21T02:35:06.267`) +* [CVE-2023-38527](CVE-2023/CVE-2023-385xx/CVE-2023-38527.json) (`2024-01-21T02:59:48.543`) ## Download and Usage