Skip to content

Commit

Permalink
Auto-Update: 2023-12-28T00:55:25.383317+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Dec 28, 2023
1 parent 9e5bc69 commit 8a28085
Show file tree
Hide file tree
Showing 32 changed files with 318 additions and 192 deletions.
18 changes: 8 additions & 10 deletions CVE-2021/CVE-2021-404xx/CVE-2021-40452.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-40452",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.633",
"lastModified": "2022-02-10T07:46:27.400",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:08.107",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40453, CVE-2021-41360."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand All @@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
Expand All @@ -35,15 +35,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
Expand Down
18 changes: 8 additions & 10 deletions CVE-2021/CVE-2021-404xx/CVE-2021-40453.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-40453",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.673",
"lastModified": "2022-02-10T07:46:32.940",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:08.333",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-41360."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand All @@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
Expand All @@ -35,15 +35,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
Expand Down
16 changes: 7 additions & 9 deletions CVE-2021/CVE-2021-413xx/CVE-2021-41333.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2021-41333",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.717",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:08.517",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
Expand All @@ -35,15 +35,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
Expand Down
18 changes: 8 additions & 10 deletions CVE-2021/CVE-2021-413xx/CVE-2021-41360.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-41360",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.753",
"lastModified": "2022-02-10T14:47:17.607",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:08.723",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-40453."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand All @@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
Expand All @@ -35,15 +35,13 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2021/CVE-2021-413xx/CVE-2021-41365.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-41365",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.797",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:08.970",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889."
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2021/CVE-2021-422xx/CVE-2021-42294.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-42294",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.887",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:09.087",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42309."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2021/CVE-2021-423xx/CVE-2021-42309.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-42309",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:08.977",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:09.197",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42294."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand Down
6 changes: 3 additions & 3 deletions CVE-2021/CVE-2021-423xx/CVE-2021-42310.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-42310",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:09.017",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:09.290",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889."
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand Down
28 changes: 14 additions & 14 deletions CVE-2021/CVE-2021-423xx/CVE-2021-42311.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-42311",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:09.060",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:09.373",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889."
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand All @@ -17,43 +17,43 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 6.0
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
Expand Down
28 changes: 14 additions & 14 deletions CVE-2021/CVE-2021-423xx/CVE-2021-42313.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-42313",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:09.140",
"lastModified": "2021-12-30T19:16:10.490",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:09.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889."
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand All @@ -17,43 +17,43 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 6.0
},
{
"source": "[email protected]",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
Expand Down
6 changes: 3 additions & 3 deletions CVE-2021/CVE-2021-423xx/CVE-2021-42314.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2021-42314",
"sourceIdentifier": "[email protected]",
"published": "2021-12-15T15:15:09.187",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-28T00:15:09.797",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889."
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability"
},
{
"lang": "es",
Expand Down
Loading

0 comments on commit 8a28085

Please sign in to comment.