diff --git a/CVE-2008/CVE-2008-40xx/CVE-2008-4078.json b/CVE-2008/CVE-2008-40xx/CVE-2008-4078.json index 378d6508d66..0f1850cecca 100644 --- a/CVE-2008/CVE-2008-40xx/CVE-2008-4078.json +++ b/CVE-2008/CVE-2008-40xx/CVE-2008-4078.json @@ -2,8 +2,8 @@ "id": "CVE-2008-4078", "sourceIdentifier": "cve@mitre.org", "published": "2008-09-15T15:14:07.397", - "lastModified": "2018-10-11T20:50:42.830", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T20:08:14.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,637 +60,17 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:*:*:*:*:*:*:*:*", - "matchCriteriaId": "F530F8B6-1D8E-43B6-87C0-957D7CB6E9D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "2BB9C66B-1984-4947-909B-E3F54DF06909" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3F0D5853-2982-48B7-B269-481C4144E213" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E1353122-B4C2-4153-AD4C-9B6D9CD2B2B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "48CFD8FA-F9E4-48BF-A9BA-9C32153A68BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "EE9C0C77-B7F3-4532-8A5C-6DCFEB449F59" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "E83ECB29-1821-4ED3-A9BD-3E4FF4693407" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "54A2DCBE-6D0F-4BE5-8554-31119A33B9AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "038721B9-C41E-4F5B-824E-7C0FB45B5C05" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "0BFD4D31-1454-47DC-BFB5-8BE12F81A055" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D208EAF0-B935-4429-A9B6-E5C442DA00C6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "EE9A1223-6E76-44C8-A8DF-80A4721DDB07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "73906EC6-6AED-4E00-B878-E14E145C63C8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "8E3142D8-A208-4663-9DE5-E2C850E545DE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9D6E6DF4-7B05-4C37-BF82-E912D768750C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "4A7F2842-997F-4403-8DD0-C5A0D506ADB1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EE971DD9-81A9-49F3-B332-C29643325DFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "836E17BD-E968-449C-AB48-9226617DAAF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "2C821D81-A9F8-4CA2-8930-603191F88DC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DCC10542-1473-4A25-A0C0-EAA1E8C724D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "51AC444F-F1F4-44E1-892E-9D195D04B082" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "3735244D-DC20-4713-9117-B838E1743A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "40C9F399-BDC3-4635-AFD0-B23C8655327E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "858502CB-8AB6-4FD2-AA98-BB6336CCE1D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "06D0A870-71C4-4E67-9377-EE2B67052DF9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "1CF31178-1F21-4F04-8BC5-59CE908673D5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "034006A3-F6B7-4E41-86E1-FBA11F78BCA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "EBC1EF7F-B2EF-459D-A2A1-EFF90B093E28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9A763C2E-DBE3-4ECD-9B01-994A8247D60A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7F52FC67-7F9C-47E1-831F-EE8BB81ADAA3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "1911B88B-2C1B-494C-95B8-47C7FFB6248C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B08FB320-0E34-40B6-9BFA-DD21F65F99E7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "4B9DEAD0-E077-4FC9-9BE6-6CD2F2729BF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "6F413591-7937-408E-AD77-67F6BF4E204A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "A419EBB7-F076-412A-B6EC-AE6A551F21FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "0359C86B-003A-446C-B880-575300B53C99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "71E696FB-F432-4022-A868-4151B1DF2517" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F272D642-B132-480B-A235-6A990FEF47E2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.13:*:*:*:*:*:*:*", - "matchCriteriaId": "F710BFC3-F5DE-498C-9669-A87F16ADCA2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.14:*:*:*:*:*:*:*", - "matchCriteriaId": "05ADA7EF-DC67-4830-97C7-EFF14FD2F327" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.15:*:*:*:*:*:*:*", - "matchCriteriaId": "1D594BCB-7FF8-417D-AC6D-B38881A075E8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.16:*:*:*:*:*:*:*", - "matchCriteriaId": "EBC86CC6-C3E2-497D-8E81-9B10C97AA008" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.17:*:*:*:*:*:*:*", - "matchCriteriaId": "71C41DD4-4E0C-42A1-9D57-D89BEC35A6A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8D54002D-D37E-4730-A8B9-5164F8426E04" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:dws_systems_inc.:sql-ledger:2.6.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B434E7A6-1924-45B9-ADE2-F237B16F87ED" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:*", - "matchCriteriaId": "D2DF897C-87CA-4090-8306-24F3CD1B3BA5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.2.14", - "matchCriteriaId": "0F149F58-5B1F-4FB0-88A2-54D480C3A8FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FBCE1BDC-52DF-4555-AB36-3A0AD4DF6EFA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "6F92E614-45B3-4744-8CFB-2F4387242B1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E4E199FF-805A-4473-8E15-B712132E0BE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "EEF4DD67-2815-418E-B6C8-F9ABDA1BA6DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "57605020-DF99-4A43-973C-11E86B076360" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "BD7ED5DA-88DB-4E0A-A262-B9F3BC48B4CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D335759B-9C72-4461-976A-35C9A89216A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "7E62585F-86AB-4CBF-B79D-14EC51DDDBAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6B0CBE0F-477A-46BC-AE59-F794861DBDAA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "4EC55F2F-AE95-48EF-8A0E-42472755F16F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D1A5301B-B9AE-442F-9792-574B062D3F4E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "14C4D433-BE8A-47FF-9FDA-36D532E1AAC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "4B6343E0-EFE0-4B66-9B38-AC42DB32926B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "C7BEF658-BAC5-4AF3-A986-6ED3BD00F7E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "DC2C6679-D87A-4CF6-BE80-589D0C57B45A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "2BEFA7BC-8DA4-48F9-8AFF-CAC0EC0DE198" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "BC984E6D-D333-46A0-8527-D231475F8212" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "6DBCD799-7702-4D90-AE52-03DF5C477A3A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ledgersmb:ledgersmb:1.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "AEB0564D-BBD5-4EA4-97B0-BA282779F3AD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:*:*:*:*:*:*:*:*", - "matchCriteriaId": "927E5EE9-4280-41F6-99B5-3CE01EBF73EF" + "versionEndExcluding": "1.2.15", + "matchCriteriaId": "4416D2DF-77A4-42E9-9920-BEF9EF00F423" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.8.17", "matchCriteriaId": "B15622DA-57A0-48A8-A271-7E8DE5D508AC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "96A468DE-4EA0-40E5-848C-9A046E9EE073" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "1AB67B38-EB93-4F07-B57D-20D839036341" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "FA5C8095-CDB8-40D3-8AE1-0F31B62DA859" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E93E88F3-AAB8-424A-909D-187490A569DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "9379DECB-18FB-47FF-B6CA-FEDE70BD0090" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "2DE7C358-802F-47B9-B905-72077F0C27D8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "08C91CB6-C4C3-4964-875B-868FCF2AFB33" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "6AA97417-7192-4BC7-8C6D-CF2F311491AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "BB579DCA-1C5C-4EA3-9EFA-B440D64B771F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "51CD497C-6B27-440C-ADD3-9CCE7835B512" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "F8647ABC-1F51-4E3C-A362-ECE15961F7AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "5587FE38-7533-45CD-B238-88691B8B0ACD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "1942D52F-6877-4B81-9157-D5CAB707D66D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "FFBA608E-699C-4D60-AF1F-1BBA3862A47B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "C5699B67-86B0-47FE-90D9-D409F6FABC15" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4D11204D-B57D-40E6-B8FE-59F48BE8EAD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "C31AB41D-86C9-4063-9D63-DEF9C463CB6A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "388D505B-8227-4C5F-93BA-B37B7FCE08A6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9895620D-BABD-4A4A-A196-BC5FCC549FE7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A067D306-200B-4EF6-A58F-0222FDA16C7F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "46865444-8B28-4DBA-8086-E2C5B5E4D33D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "8C671286-D9AC-46F0-866F-B530C25901FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "EE5762E9-A65D-43D1-AE6F-D00469F2C1F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "3A017D9C-78DE-4D35-AE6E-032311F8CF22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "D0F9DB72-874F-4369-AE14-EF33B98574E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.12:*:*:*:*:*:*:*", - "matchCriteriaId": "08A78E62-B64F-4A3F-A89A-86D19E7FA403" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.13:*:*:*:*:*:*:*", - "matchCriteriaId": "DB32ED5F-490C-4C72-96EF-FE1B239A1841" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.14:*:*:*:*:*:*:*", - "matchCriteriaId": "EE241D6D-6802-4BA6-B526-15824976C8BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2EC578E3-D2DF-497B-8D25-AE64AA39DEBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.16:*:*:*:*:*:*:*", - "matchCriteriaId": "0DAE416E-30A9-4AB3-B968-BB17EB1889F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.17:*:*:*:*:*:*:*", - "matchCriteriaId": "12BFEF80-BCC4-44BC-A7B6-D688F1688A96" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.18:*:*:*:*:*:*:*", - "matchCriteriaId": "FD7E5E53-3B67-46CA-A85F-37A93958A4BD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.19:*:*:*:*:*:*:*", - "matchCriteriaId": "BD66FE58-EF0E-4F02-9FDB-8AB5C715FCD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.20:*:*:*:*:*:*:*", - "matchCriteriaId": "32309E76-7795-47B7-937E-CB6122A1BBB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.21:*:*:*:*:*:*:*", - "matchCriteriaId": "DD3EDFA2-8A21-4331-9715-3204DAA22845" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3635B9CC-E41D-4B08-8790-088035A1BB77" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.23:*:*:*:*:*:*:*", - "matchCriteriaId": "35CDD731-E995-4513-9AC4-D0EE9820E995" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.24:*:*:*:*:*:*:*", - "matchCriteriaId": "42CAECC0-260F-4B61-ACC6-18C075003FBB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.25:*:*:*:*:*:*:*", - "matchCriteriaId": "7EC85020-344F-4B75-A79E-CA190FD8D335" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.26:*:*:*:*:*:*:*", - "matchCriteriaId": "3F314723-AE62-4DA9-8904-B27DD1D3AA28" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.6.27:*:*:*:*:*:*:*", - "matchCriteriaId": "5BB097CC-822C-4271-8D86-C978E3687630" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A5C8571C-8240-4DA2-9190-AA5844ACE954" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B8D4DB7D-B779-42C3-87E0-F19FD546B1D0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F9347B79-BF54-45B9-91BE-10AC9B8CAE1D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "80606CA8-22A2-4B8B-870D-80723DBA2EB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "3E4E69D9-273F-4816-B793-2F6BAF764C74" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F81B17BD-570A-4FB2-B9F3-D7FA1230FB39" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8EC2718E-D742-4E6A-BBA2-4FE16AB9F808" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "CA77D30D-51F9-4B1D-8BCF-3725BDA43526" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "8E9B5E2C-8C1C-4C47-B69D-A1AA17F9AAAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "79497E96-8A63-4D02-A6C4-490146BFCDAC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "5D962297-E903-4F52-A572-B58D056248E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "AD2CB622-0A42-4498-9218-EC691772BF83" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "C42629C1-3BC6-40AE-9A5C-F6E8CF5BD88E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "E89B5D37-EFC0-4C4C-AF9C-7504FBDB9DFE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.14:*:*:*:*:*:*:*", - "matchCriteriaId": "F47E4D57-7CC5-493E-97BF-E46A50D8CF84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.15:*:*:*:*:*:*:*", - "matchCriteriaId": "17E2A5DA-FB9F-43C7-BF0E-D2015064B8BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:sql-ledger:sql-ledger:2.8.16:*:*:*:*:*:*:*", - "matchCriteriaId": "23E2D064-9D18-4868-A8C1-2CED2755425F" } ] } @@ -698,28 +78,53 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/31843", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/4250", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://sourceforge.net/project/shownotes.php?group_id=175965&release_id=624978", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "http://www.securityfocus.com/archive/1/496181/100/0/threaded", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securityfocus.com/bid/31109", "source": "cve@mitre.org", "tags": [ - "Patch" + "Patch", + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45034", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2013/CVE-2013-63xx/CVE-2013-6381.json b/CVE-2013/CVE-2013-63xx/CVE-2013-6381.json index 192d4364385..1f4293c6585 100644 --- a/CVE-2013/CVE-2013-63xx/CVE-2013-6381.json +++ b/CVE-2013/CVE-2013-63xx/CVE-2013-6381.json @@ -2,8 +2,8 @@ "id": "CVE-2013-6381", "sourceIdentifier": "secalert@redhat.com", "published": "2013-11-27T04:43:33.200", - "lastModified": "2023-02-13T04:49:49.593", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:27:24.520", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,1373 +63,29 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.12.1", - "matchCriteriaId": "3E5AFED7-B198-4A43-B496-CD6B399748A6" + "versionStartExcluding": "3.2.54", + "matchCriteriaId": "3FB2B9DA-BE4B-42A5-A01F-A5D521DE59AE" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", - "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", - "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.72", + "matchCriteriaId": "FFF0F0CB-27AB-445B-9FE3-07707BCA9CCD" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2422AC23-8410-4524-A733-25E4ABC7515D" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.22", + "matchCriteriaId": "C2F8C849-0849-4DE9-B105-E2E3556F15D6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.12.3", + "matchCriteriaId": "ED28A5F7-15BA-47D1-8EB2-667F31F808D4" } ] } @@ -1439,31 +95,56 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0159.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0284.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-0285.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/11/22/5", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/63890", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033600", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62", diff --git a/CVE-2014/CVE-2014-00xx/CVE-2014-0038.json b/CVE-2014/CVE-2014-00xx/CVE-2014-0038.json index 49e7e7adad1..2463102b103 100644 --- a/CVE-2014/CVE-2014-00xx/CVE-2014-0038.json +++ b/CVE-2014/CVE-2014-00xx/CVE-2014-0038.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0038", "sourceIdentifier": "secalert@redhat.com", "published": "2014-02-06T22:55:03.327", - "lastModified": "2023-02-13T00:30:01.393", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:14:07.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,1503 +63,45 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.13.1", - "matchCriteriaId": "DCD68F67-324B-41AE-AC7B-5712150E501B" + "versionStartIncluding": "3.4", + "versionEndExcluding": "3.4.79", + "matchCriteriaId": "7E142EF6-862F-4E41-8B73-A31049601EE7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*", - "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*", - "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*", - "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", - "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", - "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", - "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*", - "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*", - "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*", - "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*", - "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*", - "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*", - "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*", - "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*", - "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*", - "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*", - "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*", - "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*", - "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*", - "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*", - "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*", - "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*", - "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", - "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", - "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", - "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*", - "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*", - "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*", - "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*", - "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*", - "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*", - "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*", - "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", - "matchCriteriaId": "1C37F47C-C217-4BCF-A758-14E1BDBAD63D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*", - "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*", - "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*", - "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*", - "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*", - "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*", - "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*", - "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*", - "matchCriteriaId": "0244B0CA-9C67-4F06-BFBA-1F257112AC08" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*", - "matchCriteriaId": "2148C13F-4BB0-4D46-A688-F7C726D12497" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9871AF57-9158-4A41-8340-596B4463289A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*", - "matchCriteriaId": "2A875207-DF01-4240-8895-49B62693D27B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FE04A172-6F3B-4E3B-8D4D-564740FABAAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*", - "matchCriteriaId": "CFEEF8C4-7DC2-4230-B58C-337F39A4DFAF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*", - "matchCriteriaId": "9F74DB5C-5096-438C-8C8A-6D337A2FD06A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*", - "matchCriteriaId": "9DFF4564-6550-4839-B12A-EA379DDFE4F1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*", - "matchCriteriaId": "10184594-C707-4A2F-AE28-430EC3102AA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*", - "matchCriteriaId": "9AD06026-B85F-412A-A44B-DAEF8D538327" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*", - "matchCriteriaId": "DCA2929F-EDF9-433B-9CD7-3EE9D2C5EDD4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*", - "matchCriteriaId": "80527FA6-39CD-4A85-BD3A-214AC617B995" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4DCA90D7-AF62-4576-9139-107842834066" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.25:*:*:*:*:*:*:*", - "matchCriteriaId": "9B61F12C-8F6E-4BDD-8793-76E3BCAB73CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.26:*:*:*:*:*:*:*", - "matchCriteriaId": "A569A978-0CF1-46BC-A174-7F7F2ADCE8A7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E2D473E1-3F56-4415-9ACB-4F4CA9707E78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.28:*:*:*:*:*:*:*", - "matchCriteriaId": "FF938D94-226A-4375-8DEF-B4019AE5AFC8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.29:*:*:*:*:*:*:*", - "matchCriteriaId": "5EF4FFA5-BF94-4C87-ADB7-984111D98833" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*", - "matchCriteriaId": "639E3A57-A9E7-40E6-8929-81CCC0060EFB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*", - "matchCriteriaId": "07012ADD-F521-40A8-B067-E87C2238A3D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3F5FF393-3F89-4274-B82B-F671358072ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E348698F-54D1-4F5E-B701-CFAF50881E0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*", - "matchCriteriaId": "932205D9-3514-4289-9B55-C7A169276930" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*", - "matchCriteriaId": "2ECB2D33-F517-480F-8A6F-99D9D6C49596" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*", - "matchCriteriaId": "D16F68DD-E2D4-4AA4-AB81-3796C2947E37" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*", - "matchCriteriaId": "2422AC23-8410-4524-A733-25E4ABC7515D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*", - "matchCriteriaId": "E1BEBC08-884B-4F58-B3C6-B26F1D5BE474" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*", - "matchCriteriaId": "B26B7E40-0EEB-44DF-BE2E-917947D41217" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*", - "matchCriteriaId": "EF5C073C-D0BF-4691-94C4-6E4582032F1E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", - "matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", - "matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", - "matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", - "matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", - "matchCriteriaId": "4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7C9A32A2-C1EC-4463-B21F-79E6592C5339" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", - "matchCriteriaId": "DD8683B9-63EF-43D0-8E4F-2909429B47E6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", - "matchCriteriaId": "91F6A187-E8B1-47CF-B375-FB453F8000F2" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.29", + "matchCriteriaId": "8F700F58-09D3-4669-9566-04E1C0878039" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", - "matchCriteriaId": "97A4332E-E1D4-4B6E-B9FE-B33CCF083402" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.12.10", + "matchCriteriaId": "EB06BD50-4709-4BF4-815C-38FA2E41E98C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", - "matchCriteriaId": "1949D7D6-7DD2-458B-89D3-B0090C8E9984" - }, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.13", + "versionEndExcluding": "3.13.2", + "matchCriteriaId": "C75881C3-7A23-4C99-A1C1-9ED2F1EA378D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", - "matchCriteriaId": "50513044-C297-4D5E-BD45-6FD603A29F25" + "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" } ] } @@ -1569,15 +111,27 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://pastebin.com/raw.php?i=DH3Lbg54", @@ -1588,57 +142,96 @@ }, { "url": "http://secunia.com/advisories/56669", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Not Applicable" + ] }, { "url": "http://www.exploit-db.com/exploits/31346", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.exploit-db.com/exploits/31347", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:038", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2014/01/31/2", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/65255", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2094-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2095-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2096-1", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060023", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://code.google.com/p/chromium/issues/detail?id=338594", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/saelo/cve-2014-0038", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -1651,7 +244,11 @@ }, { "url": "https://www.exploit-db.com/exploits/40503/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json b/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json index 74888a140ef..d1e41f02f18 100644 --- a/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json +++ b/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json @@ -2,8 +2,12 @@ "id": "CVE-2014-0196", "sourceIdentifier": "secalert@redhat.com", "published": "2014-05-07T10:55:04.337", - "lastModified": "2023-02-13T00:36:17.733", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:24:10.937", + "vulnStatus": "Analyzed", + "cisaExploitAdd": "2023-05-12", + "cisaActionDue": "2023-06-02", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Linux Kernel Race Condition Vulnerability", "descriptions": [ { "lang": "en", @@ -63,8 +67,77 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.14.3", - "matchCriteriaId": "B465C548-09E9-4CD5-A1C2-57ED09C9E3F4" + "versionStartExcluding": "2.6.31", + "versionEndExcluding": "3.2.59", + "matchCriteriaId": "FFDB0B31-FFF7-471B-9352-29099002BED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.91", + "matchCriteriaId": "992BFD6A-701C-4412-9220-F6C77B4E64F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.40", + "matchCriteriaId": "287DC65B-A513-4FB9-A1CF-69F428030DF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.12.20", + "matchCriteriaId": "D82F8C94-5FA7-4A7A-8855-ECF21B3BBD42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.13", + "versionEndExcluding": "3.14.4", + "matchCriteriaId": "9996644C-371E-49B9-A494-733B1EA513EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*", + "matchCriteriaId": "2887290A-1B43-4DB9-A9D0-B0B56CD78E48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", + "matchCriteriaId": "A2507858-675B-4DA2-A49E-00DB54700CF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", + "matchCriteriaId": "0A25EA55-3F1C-440C-A383-0BB9556C9508" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B2665356-4EF5-4543-AD15-67FDB851DCCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", + "matchCriteriaId": "26E7609B-B058-496D-ACDD-7F69FBDE89E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", + "matchCriteriaId": "210BF049-8B3C-4ACC-BF8E-2C3551477602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", + "matchCriteriaId": "1837F32C-80D3-4E10-AE5D-E9F5A11A434E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc9:*:*:*:*:*:*", + "matchCriteriaId": "4B4E132B-A69A-4CD1-B4D9-E17C4361A3AC" } ] } @@ -350,13 +423,17 @@ "url": "http://bugzilla.novell.com/show_bug.cgi?id=875690", "source": "secalert@redhat.com", "tags": [ + "Issue Tracking", "Permissions Required", "Third Party Advisory" ] }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] }, { "url": "http://linux.oracle.com/errata/ELSA-2014-0771.html", @@ -404,6 +481,20 @@ "Not Applicable" ] }, + { + "url": "http://secunia.com/advisories/59262", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/59599", + "source": "secalert@redhat.com", + "tags": [ + "Broken Link" + ] + }, { "url": "http://source.android.com/security/bulletin/2016-07-01.html", "source": "secalert@redhat.com", diff --git a/CVE-2014/CVE-2014-31xx/CVE-2014-3181.json b/CVE-2014/CVE-2014-31xx/CVE-2014-3181.json index 910f36005fa..c5718757873 100644 --- a/CVE-2014/CVE-2014-31xx/CVE-2014-3181.json +++ b/CVE-2014/CVE-2014-31xx/CVE-2014-3181.json @@ -2,8 +2,8 @@ "id": "CVE-2014-3181", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-09-28T10:55:10.080", - "lastModified": "2023-11-07T02:19:55.790", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:25:26.897", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,23 +63,44 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.16.3", - "matchCriteriaId": "8C427357-33C1-4CA4-826A-F3CDB451B4A6" + "versionStartIncluding": "2.6.37", + "versionEndExcluding": "3.2.63", + "matchCriteriaId": "FD433771-7205-41B8-848A-FF1B51543C0D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*", - "matchCriteriaId": "3CFFCDFC-AE4F-47EE-B1DA-05A6865D1745" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.104", + "matchCriteriaId": "95E0847B-5988-4925-98FF-29EEE803ECC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.10.56", + "matchCriteriaId": "E2191FD4-0CB4-4F8A-8726-76D49FEA4D47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "3.12.31", + "matchCriteriaId": "67AF3C65-8392-4F2B-9177-BFE7217D2A9C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.16.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3C610146-2E9B-43D3-A78F-26EDE1E918A3" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.13", + "versionEndExcluding": "3.14.20", + "matchCriteriaId": "77E5DE5F-B918-4793-8BD2-75145FAC7A19" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.16.2:*:*:*:*:*:*:*", - "matchCriteriaId": "C5EC457D-AE94-4AD1-921E-6761BDA7465D" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.15", + "versionEndExcluding": "3.16.4", + "matchCriteriaId": "A0038C65-82B1-4326-9FA6-3468B58A40B5" } ] } @@ -89,55 +110,98 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c54def7bd64d7c0b6993336abcffb8444795bf38", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2014/09/11/21", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/69779", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2376-1", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2377-1", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2378-1", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2379-1", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141173", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://code.google.com/p/google-security-research/issues/detail?id=100", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/torvalds/linux/commit/c54def7bd64d7c0b6993336abcffb8444795bf38", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-60xx/CVE-2017-6001.json b/CVE-2017/CVE-2017-60xx/CVE-2017-6001.json index dc4f8e4a63b..8124b56605b 100644 --- a/CVE-2017/CVE-2017-60xx/CVE-2017-6001.json +++ b/CVE-2017/CVE-2017-60xx/CVE-2017-6001.json @@ -2,8 +2,8 @@ "id": "CVE-2017-6001", "sourceIdentifier": "cve@mitre.org", "published": "2017-02-18T21:59:00.193", - "lastModified": "2018-06-20T01:29:01.103", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:11:41.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -85,8 +85,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.9.6", - "matchCriteriaId": "55352769-0317-401E-901B-1AE7A7ADD86F" + "versionStartIncluding": "3.18.54", + "versionEndExcluding": "3.18.92", + "matchCriteriaId": "F22ADC27-849C-43FC-A6FB-FEEE92B3C850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.4.65", + "matchCriteriaId": "F0B53829-8BD0-46CE-A754-72D6C2A2B7C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.7", + "matchCriteriaId": "20EE2EFD-24B9-486E-8B08-FB740ABD8585" } ] } @@ -105,7 +120,11 @@ }, { "url": "http://www.debian.org/security/2017/dsa-3791", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7", @@ -126,23 +145,41 @@ }, { "url": "http://www.securityfocus.com/bid/96264", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:1842", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:2077", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:2669", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2018:1854", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825", @@ -163,7 +200,11 @@ }, { "url": "https://source.android.com/security/bulletin/pixel/2017-11-01", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-122xx/CVE-2018-12233.json b/CVE-2018/CVE-2018-122xx/CVE-2018-12233.json index a155cbe0394..9c4319b8528 100644 --- a/CVE-2018/CVE-2018-122xx/CVE-2018-12233.json +++ b/CVE-2018/CVE-2018-122xx/CVE-2018-12233.json @@ -2,7 +2,7 @@ "id": "CVE-2018-12233", "sourceIdentifier": "cve@mitre.org", "published": "2018-06-12T12:29:00.257", - "lastModified": "2019-03-27T16:11:29.733", + "lastModified": "2024-02-09T19:12:31.957", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,44 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.17.1", - "matchCriteriaId": "5CF7338D-D530-4EEA-B1D6-926A91AC72BE" + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "3.16.58", + "matchCriteriaId": "ABFDF86F-0011-410C-AE44-1E2AE33D4493" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "3.18.118", + "matchCriteriaId": "2074A1A6-184A-421C-8B1E-C3C263A7B236" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.4.147", + "matchCriteriaId": "800FA499-24A3-4FE0-A2F2-07AA6577691E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.119", + "matchCriteriaId": "36E16AF0-AE78-4091-B203-C3BB651C3B44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.62", + "matchCriteriaId": "D695CD83-997F-47A0-A160-C515C6F92B2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.17.14", + "matchCriteriaId": "61028EF5-1942-436D-B405-8424142A8158" } ] } @@ -131,28 +167,32 @@ "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://lkml.org/lkml/2018/6/2/2", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -166,42 +206,48 @@ "url": "https://usn.ubuntu.com/3752-1/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://usn.ubuntu.com/3752-2/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://usn.ubuntu.com/3752-3/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://usn.ubuntu.com/3753-1/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://usn.ubuntu.com/3753-2/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://usn.ubuntu.com/3754-1/", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2021/CVE-2021-215xx/CVE-2021-21575.json b/CVE-2021/CVE-2021-215xx/CVE-2021-21575.json index e1e994fb17e..74acb83e08a 100644 --- a/CVE-2021/CVE-2021-215xx/CVE-2021-21575.json +++ b/CVE-2021/CVE-2021-215xx/CVE-2021-21575.json @@ -2,16 +2,40 @@ "id": "CVE-2021-21575", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-02T16:15:45.230", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:26:04.557", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nDell BSAFE Micro Edition Suite,\u00a0versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.\n\n" + }, + { + "lang": "es", + "value": "Dell BSAFE Micro Edition Suite, versiones anteriores a 4.5.2, contienen una vulnerabilidad de discrepancia de tiempo observable." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.5.2", + "matchCriteriaId": "84735DD4-8297-4476-9013-967E9E323D9F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000189462/dsa-2021-131-dell-bsafetm-micro-edition-suite-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34381.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34381.json index c80a2afaf54..93ec4653e48 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34381.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34381.json @@ -2,16 +2,40 @@ "id": "CVE-2022-34381", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-02T16:15:45.460", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:16:44.880", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nDell BSAFE SSL-J version 7.0 and all versions prior to 6.5, and Dell BSAFE Crypto-J versions prior to 6.2.6.1 contain an unmaintained third-party component vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to the compromise of the impacted system. This is a Critical vulnerability and Dell recommends customers to upgrade at the earliest opportunity.\n\n" + }, + { + "lang": "es", + "value": "Dell BSAFE SSL-J versi\u00f3n 7.0 y todas las versiones anteriores a 6.5, y las versiones Dell BSAFE Crypto-J anteriores a 6.2.6.1 contienen una vulnerabilidad de componente de terceros sin mantenimiento. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad, lo que comprometer\u00eda el sistema afectado. Esta es una vulnerabilidad cr\u00edtica y Dell recomienda a los clientes actualizar lo antes posible." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -46,10 +80,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5", + "matchCriteriaId": "82A7B894-3248-4DF6-9DCC-E544979EB97D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "50D0F0DB-24D9-4338-A981-48777D482BB0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:bsafe_crypto-j:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.6.1", + "matchCriteriaId": "44FBBAF8-810E-4CF3-8255-1279D6FBB2A4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000203278/dsa-2022-208-dell-bsafe-ssl-j-6-5-and-7-1-and-dell-bsafe-crypto-j-6-2-6-1-and-7-0-security-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json index a1fd3f9ce66..4eabe71949d 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35829.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35829", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-18T22:15:09.460", - "lastModified": "2023-11-07T04:16:02.983", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:13:28.167", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,8 +60,67 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.180", + "matchCriteriaId": "76760B6D-B26D-49FF-A946-F832EB4992B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.111", + "matchCriteriaId": "2B9DD776-7F17-4F72-B94F-54BFCBC692DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.28", + "matchCriteriaId": "08F855F4-7188-4EE1-BD79-D4B6C7E2EF54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.2.15", + "matchCriteriaId": "3844A90B-940D-46C3-8D7B-9FF63F1AFC2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3", "versionEndExcluding": "6.3.2", - "matchCriteriaId": "86A4A377-C6B0-4E94-8486-019155A51116" + "matchCriteriaId": "38F6F330-91A0-4675-8B90-6F950471A7CC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F" } ] } @@ -87,15 +146,25 @@ }, { "url": "https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lore.kernel.org/lkml/20230307173900.1299387-1-zyytlz.wz%40163.com/T/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230803-0002/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json index 479237f89a2..ebc51ccee1a 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36496.json @@ -2,16 +2,40 @@ "id": "CVE-2023-36496", "sourceIdentifier": "responsible-disclosure@pingidentity.com", "published": "2024-02-01T23:15:09.107", - "lastModified": "2024-02-02T01:58:03.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:47:24.757", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Delegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.\n" + }, + { + "lang": "es", + "value": "El complemento del proveedor de atributos virtuales Delegated Admin Privilege, cuando est\u00e1 habilitado, permite a un usuario autenticado elevar sus permisos en Directory Server." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "responsible-disclosure@pingidentity.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "responsible-disclosure@pingidentity.com", "type": "Secondary", @@ -46,18 +80,80 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3.0.0", + "versionEndIncluding": "8.3.0.8", + "matchCriteriaId": "2962B5D8-A12A-4D50-99AE-6355AB08F5DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0.0", + "versionEndIncluding": "9.0.0.5", + "matchCriteriaId": "70836EEB-D037-4560-962B-630C9CCD1262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0.0", + "versionEndIncluding": "9.1.0.2", + "matchCriteriaId": "CBC21BB8-89C1-4DEA-A6D4-F44B99CEEB66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:9.2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "402022A7-8257-4453-A488-3B87767FFC2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:9.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "20441BBB-9D6F-4AB5-A007-087AEAE5B7C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:9.3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "66F04A80-B97A-4C03-B75B-F44CEAB7BE15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pingidentity:pingdirectory:9.3.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DE606D4B-6F7A-4334-BB4E-8D161E3E9C35" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.pingidentity.com/r/en-us/pingdirectory-93/ynf1693338390284", - "source": "responsible-disclosure@pingidentity.com" + "source": "responsible-disclosure@pingidentity.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://support.pingidentity.com/s/article/SECADV039", - "source": "responsible-disclosure@pingidentity.com" + "source": "responsible-disclosure@pingidentity.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.pingidentity.com/en/resources/downloads/pingdirectory-downloads.html", - "source": "responsible-disclosure@pingidentity.com" + "source": "responsible-disclosure@pingidentity.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json index 53dd711dfa5..8d280271f34 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38019.json @@ -2,16 +2,40 @@ "id": "CVE-2023-38019", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T04:15:07.937", - "lastModified": "2024-02-02T04:58:55.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:13:52.923", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 260575." + }, + { + "lang": "es", + "value": "IBM SOAR QRadar Plugin App 1.0 a 5.0.3 podr\u00eda permitir a un atacante remoto atravesar directorios del sistema. Un atacante podr\u00eda enviar una solicitud URL especialmente manipulada que contenga secuencias de \"puntos\" (/../) para ver archivos arbitrarios en el sistema. ID de IBM X-Force: 260575." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -46,14 +70,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:soar_qradar_plugin_app:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0", + "versionEndExcluding": "5.0.3", + "matchCriteriaId": "9AFCF0C1-F204-412B-803A-941397E4F2FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260575", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7111679", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4472.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4472.json index cd1f1597472..028a90c3337 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4472.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4472.json @@ -2,16 +2,53 @@ "id": "CVE-2023-4472", "sourceIdentifier": "mandiant-cve@google.com", "published": "2024-02-01T22:15:55.220", - "lastModified": "2024-02-01T22:39:14.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:49:05.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Objectplanet Opinio version 7.22 and prior uses a cryptographically weak pseudo-random number generator (PRNG) coupled to a predictable seed, which could lead to an unauthenticated account takeover of any user on the application." + }, + { + "lang": "es", + "value": "Objectplanet Opinio versi\u00f3n 7.22 y anteriores utiliza un generador de n\u00fameros pseudoaleatorios (PRNG) criptogr\u00e1ficamente d\u00e9bil acoplado a una semilla predecible, lo que podr\u00eda conducir a una apropiaci\u00f3n no autenticada de la cuenta de cualquier usuario de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-335" + } + ] + }, { "source": "mandiant-cve@google.com", "type": "Secondary", @@ -23,14 +60,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:objectplanet:opinio:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.23", + "matchCriteriaId": "2A09C2A9-4E46-4B49-AC57-DEFD7E693093" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2024/MNDT-2024-0002.md", - "source": "mandiant-cve@google.com" + "source": "mandiant-cve@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.objectplanet.com/opinio/changelog.html", - "source": "mandiant-cve@google.com" + "source": "mandiant-cve@google.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json index 10981dc5c32..1731f92f29d 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46344.json @@ -2,23 +2,98 @@ "id": "CVE-2023-46344", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.537", - "lastModified": "2024-02-02T04:58:55.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:43:40.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en Solar-Log Base 15 Firmware 6.0.1 Build 161, y posiblemente en otros productos Solar-Log Base, permite a un atacante escalar sus privilegios explotando una vulnerabilidad de cross-site scripting (XSS) almacenada en la funci\u00f3n de grupo de conmutadores en / #ilang=DE&b=c_smartenergy_swgroups en el portal web. La vulnerabilidad se puede aprovechar para obtener los derechos de un instalador o PM, que luego se puede utilizar para obtener acceso administrativo al portal web y ejecutar m\u00e1s ataques." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:solar-log:2000_pm\\+_firmware:15.10.2019:*:*:*:*:*:*:*", + "matchCriteriaId": "3CFA48BC-724C-49F9-8FD6-5BBECD34C585" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:solar-log:2000_pm\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8E94086-68EC-4BAF-AB40-F2F4E679F761" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "http://solar-log.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47564.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47564.json index 36840b71087..d5304bbda99 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47564.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47564.json @@ -2,16 +2,40 @@ "id": "CVE-2023-47564", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-02-02T16:15:52.280", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:33:26.900", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An incorrect permission assignment for critical resource vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow authenticated users to read or modify the resource via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQsync Central 4.4.0.15 ( 2024/01/04 ) and later\nQsync Central 4.3.0.11 ( 2024/01/11 ) and later\n" + }, + { + "lang": "es", + "value": "Se ha informado que una asignaci\u00f3n incorrecta de permisos para una vulnerabilidad de recursos cr\u00edticos afecta a Qsync Central. Si se explota, la vulnerabilidad podr\u00eda permitir a los usuarios autenticados leer o modificar el recurso a trav\u00e9s de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: Qsync Central 4.4.0.15 (2024/01/04) y posteriores Qsync Central 4.3.0.11 (2024/01/11) y posteriores" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -46,10 +70,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0.0", + "versionEndExcluding": "4.3.0.11", + "matchCriteriaId": "1F85C926-E2FE-4A8A-95E2-963CFEA1FF7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4.0.0", + "versionEndExcluding": "4.4.0.15", + "matchCriteriaId": "E37FF244-46C8-4849-95D8-03EBCFBADDB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-03", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json index 9fdfe2c4be4..deb7b2d0c1f 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48792.json @@ -2,23 +2,136 @@ "id": "CVE-2023-48792", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.590", - "lastModified": "2024-02-02T04:58:55.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:41:33.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine ADAudit Plus through 7250 is vulnerable to SQL Injection in the report export option." + }, + { + "lang": "es", + "value": "Zoho ManageEngine ADAudit Plus hasta 7250 es vulnerable a la inyecci\u00f3n SQL en la opci\u00f3n de exportaci\u00f3n de informes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "E802FD77-E67A-438C-82CE-9FC7536FB14E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7200:*:*:*:*:*:*", + "matchCriteriaId": "0FAF63F4-AED2-4EA4-BA5B-45961B2E29B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7201:*:*:*:*:*:*", + "matchCriteriaId": "237AA2F5-B9A3-4C40-92AC-61FE47A017BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7202:*:*:*:*:*:*", + "matchCriteriaId": "4C23A64C-65CB-447B-9B5F-4BB22F68FC79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7203:*:*:*:*:*:*", + "matchCriteriaId": "3489D84B-5960-4FA7-A2DD-88AE35C34CE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7210:*:*:*:*:*:*", + "matchCriteriaId": "D86AB1CC-0FDE-4CC1-BF64-E0C61EAF652F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7211:*:*:*:*:*:*", + "matchCriteriaId": "076FDAE7-9DB2-4A04-B09E-E53858D208C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7212:*:*:*:*:*:*", + "matchCriteriaId": "07C08B57-FA76-4E24-BC10-B837597BC7E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7213:*:*:*:*:*:*", + "matchCriteriaId": "0D734ACB-33E8-4315-8A79-2B97CE1D0509" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7215:*:*:*:*:*:*", + "matchCriteriaId": "9314CA98-7A69-4D2B-9928-40F55888C9FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7220:*:*:*:*:*:*", + "matchCriteriaId": "BCE7999C-D6AE-4406-A563-A520A171381D" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://manageengine.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json index 7b81fb79958..7ec071c76ea 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48793.json @@ -2,23 +2,156 @@ "id": "CVE-2023-48793", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T02:15:16.637", - "lastModified": "2024-02-02T04:58:55.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:40:42.787", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Zoho ManageEngine ADAudit Plus through 7250 allows SQL Injection in the aggregate report feature." + }, + { + "lang": "es", + "value": "Zoho ManageEngine ADAudit Plus hasta 7250 permite la inyecci\u00f3n SQL en la funci\u00f3n de informe agregado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "E802FD77-E67A-438C-82CE-9FC7536FB14E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7200:*:*:*:*:*:*", + "matchCriteriaId": "0FAF63F4-AED2-4EA4-BA5B-45961B2E29B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7201:*:*:*:*:*:*", + "matchCriteriaId": "237AA2F5-B9A3-4C40-92AC-61FE47A017BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7202:*:*:*:*:*:*", + "matchCriteriaId": "4C23A64C-65CB-447B-9B5F-4BB22F68FC79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7203:*:*:*:*:*:*", + "matchCriteriaId": "3489D84B-5960-4FA7-A2DD-88AE35C34CE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7210:*:*:*:*:*:*", + "matchCriteriaId": "D86AB1CC-0FDE-4CC1-BF64-E0C61EAF652F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7211:*:*:*:*:*:*", + "matchCriteriaId": "076FDAE7-9DB2-4A04-B09E-E53858D208C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7212:*:*:*:*:*:*", + "matchCriteriaId": "07C08B57-FA76-4E24-BC10-B837597BC7E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7213:*:*:*:*:*:*", + "matchCriteriaId": "0D734ACB-33E8-4315-8A79-2B97CE1D0509" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7215:*:*:*:*:*:*", + "matchCriteriaId": "9314CA98-7A69-4D2B-9928-40F55888C9FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7220:*:*:*:*:*:*", + "matchCriteriaId": "BCE7999C-D6AE-4406-A563-A520A171381D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7250:*:*:*:*:*:*", + "matchCriteriaId": "D5716895-4553-4613-B774-0964D3E88AA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7251:*:*:*:*:*:*", + "matchCriteriaId": "C40A093F-C442-4B05-8746-B533DE0683A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7260:*:*:*:*:*:*", + "matchCriteriaId": "562563FC-DBAD-441C-B01A-796AFB67DA0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7270:*:*:*:*:*:*", + "matchCriteriaId": "094FB6FD-1ADF-4583-91D4-94A9B6395AD2" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://manageengine.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json index dcd966f239b..3c28119014b 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50291.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50291", "sourceIdentifier": "security@apache.org", "published": "2024-02-09T18:15:08.240", - "lastModified": "2024-02-09T18:15:08.240", + "lastModified": "2024-02-09T19:15:11.070", "vulnStatus": "Received", "descriptions": [ { @@ -24,6 +24,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/09/4", + "source": "security@apache.org" + }, { "url": "https://solr.apache.org/security.html#cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies", "source": "security@apache.org" diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json index 2a0d1a9c5d5..04abe10bad6 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50292.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50292", "sourceIdentifier": "security@apache.org", "published": "2024-02-09T18:15:08.363", - "lastModified": "2024-02-09T18:15:08.363", + "lastModified": "2024-02-09T19:15:11.147", "vulnStatus": "Received", "descriptions": [ { @@ -24,6 +24,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/09/3", + "source": "security@apache.org" + }, { "url": "https://solr.apache.org/security.html#cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions", "source": "security@apache.org" diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50298.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50298.json index e62330b48b4..c55f65cbedb 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50298.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50298.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50298", "sourceIdentifier": "security@apache.org", "published": "2024-02-09T18:15:08.457", - "lastModified": "2024-02-09T18:15:08.457", + "lastModified": "2024-02-09T19:15:11.210", "vulnStatus": "Received", "descriptions": [ { @@ -24,6 +24,14 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/09/2", + "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/09/3", + "source": "security@apache.org" + }, { "url": "https://solr.apache.org/security.html#cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions", "source": "security@apache.org" diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json index 85c792058a4..b15f80f46bc 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50386.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50386", "sourceIdentifier": "security@apache.org", "published": "2024-02-09T18:15:08.540", - "lastModified": "2024-02-09T18:15:08.540", + "lastModified": "2024-02-09T19:15:11.277", "vulnStatus": "Received", "descriptions": [ { @@ -28,6 +28,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/09/1", + "source": "security@apache.org" + }, { "url": "https://solr.apache.org/security.html#cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets", "source": "security@apache.org" diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51072.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51072.json index f8e947f2b37..f54c59840e4 100644 --- a/CVE-2023/CVE-2023-510xx/CVE-2023-51072.json +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51072.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51072", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T10:15:08.263", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:45:58.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,72 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenada en el componente NOC de la versi\u00f3n Nagios XI hasta 2024R1 inclusive permite a usuarios con pocos privilegios ejecutar c\u00f3digo HTML o JavaScript malicioso a trav\u00e9s de la funcionalidad de carga de archivos de audio desde la secci\u00f3n Operation Center. Esto permite que cualquier usuario autenticado ejecute c\u00f3digo JavaScript arbitrario en nombre de otros usuarios, incluidos los administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024", + "matchCriteriaId": "62CF7BF4-6AAA-443E-93B4-B2F080091C13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1:*:*:*:*:*:*", + "matchCriteriaId": "85F1764D-1DD8-44B0-BF5A-2420CB519A3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nagios.com/products/security/#nagios-xi", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5841.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5841.json index f1adda0dc92..727e216d2c3 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5841.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5841.json @@ -2,16 +2,53 @@ "id": "CVE-2023-5841", "sourceIdentifier": "cve@takeonme.org", "published": "2024-02-01T19:15:08.097", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:19:43.133", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX\u00a0image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability." + }, + { + "lang": "es", + "value": "Debido a un fallo en la validaci\u00f3n del n\u00famero de muestras de l\u00edneas de escaneo de un archivo OpenEXR que contiene datos de l\u00edneas de escaneo profundas, la librer\u00eda de an\u00e1lisis de im\u00e1genes Academy Software Foundation OpenEX versi\u00f3n 3.2.1 y anteriores es susceptible a una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "cve@takeonme.org", "type": "Secondary", @@ -23,10 +60,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.2.1", + "matchCriteriaId": "95B42B05-2815-4CB0-99A1-B19F587AA13C" + } + ] + } + ] + } + ], "references": [ { "url": "https://takeonme.org/cves/CVE-2023-5841.html", - "source": "cve@takeonme.org" + "source": "cve@takeonme.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6078.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6078.json index 9f87fc63835..57db2b26ec2 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6078.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6078.json @@ -2,16 +2,40 @@ "id": "CVE-2023-6078", "sourceIdentifier": "3DS.Information-Security@3ds.com", "published": "2024-02-01T14:15:55.810", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:23:01.477", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An OS Command Injection vulnerability exists in BIOVIA Materials Studio products from Release BIOVIA 2021 through Release BIOVIA 2023. Upload of a specially crafted perl script can lead to arbitrary command execution." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en los productos BIOVIA Materials Studio desde la versi\u00f3n BIOVIA 2021 hasta la versi\u00f3n BIOVIA 2023. La carga de un script perl especialmente manipulado puede provocar la ejecuci\u00f3n de comandos arbitrarios." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "3DS.Information-Security@3ds.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "3DS.Information-Security@3ds.com", "type": "Secondary", @@ -46,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3ds:biovia_materials_studio:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2021", + "versionEndIncluding": "2023", + "matchCriteriaId": "EE86B786-867B-46D5-9FE0-40FF6ADFE1EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.3ds.com/vulnerability/advisories", - "source": "3DS.Information-Security@3ds.com" + "source": "3DS.Information-Security@3ds.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json index c1071f0a25c..e14a23d36c7 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6780.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6780", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-31T14:15:48.917", - "lastModified": "2024-02-09T14:15:08.537", - "vulnStatus": "Modified", + "lastModified": "2024-02-09T19:26:02.607", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -94,8 +94,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.37", - "matchCriteriaId": "8CFD354C-94B0-4DF2-B943-780F99A0CF07" + "versionStartIncluding": "2.37", + "matchCriteriaId": "4A1D8F1D-02AB-4FC7-9AD2-817AA41EAA0E" } ] } @@ -186,7 +186,10 @@ }, { "url": "https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0186.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0186.json index 4ecb2fb30cd..c48f1677073 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0186.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0186.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0186", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-02T01:15:08.273", - "lastModified": "2024-01-08T19:26:38.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:11.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0195.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0195.json index 63b2d864093..b3e56135f70 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0195.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0195", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-02T21:15:10.003", - "lastModified": "2024-01-09T02:03:10.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:11.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0196.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0196.json index ff696277a9f..38a40ef431f 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0196.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0196", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-02T22:15:09.453", - "lastModified": "2024-01-09T18:39:21.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:11.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json index 7712a573892..6f5ae0faef0 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0269.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0269", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-02-02T13:15:09.880", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:56:14.050", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "0fc0942c-577d-436f-ae8e-945763c79b02", "type": "Secondary", @@ -38,10 +58,113 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "E802FD77-E67A-438C-82CE-9FC7536FB14E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7200:*:*:*:*:*:*", + "matchCriteriaId": "0FAF63F4-AED2-4EA4-BA5B-45961B2E29B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7201:*:*:*:*:*:*", + "matchCriteriaId": "237AA2F5-B9A3-4C40-92AC-61FE47A017BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7202:*:*:*:*:*:*", + "matchCriteriaId": "4C23A64C-65CB-447B-9B5F-4BB22F68FC79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7203:*:*:*:*:*:*", + "matchCriteriaId": "3489D84B-5960-4FA7-A2DD-88AE35C34CE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7210:*:*:*:*:*:*", + "matchCriteriaId": "D86AB1CC-0FDE-4CC1-BF64-E0C61EAF652F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7211:*:*:*:*:*:*", + "matchCriteriaId": "076FDAE7-9DB2-4A04-B09E-E53858D208C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7212:*:*:*:*:*:*", + "matchCriteriaId": "07C08B57-FA76-4E24-BC10-B837597BC7E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7213:*:*:*:*:*:*", + "matchCriteriaId": "0D734ACB-33E8-4315-8A79-2B97CE1D0509" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7215:*:*:*:*:*:*", + "matchCriteriaId": "9314CA98-7A69-4D2B-9928-40F55888C9FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7220:*:*:*:*:*:*", + "matchCriteriaId": "BCE7999C-D6AE-4406-A563-A520A171381D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7250:*:*:*:*:*:*", + "matchCriteriaId": "D5716895-4553-4613-B774-0964D3E88AA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7251:*:*:*:*:*:*", + "matchCriteriaId": "C40A093F-C442-4B05-8746-B533DE0683A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7260:*:*:*:*:*:*", + "matchCriteriaId": "562563FC-DBAD-441C-B01A-796AFB67DA0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.2:7270:*:*:*:*:*:*", + "matchCriteriaId": "094FB6FD-1ADF-4583-91D4-94A9B6395AD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.manageengine.com/products/active-directory-audit/sqlfix-7271.html", - "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0287.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0287.json index 36ad5474525..3d0ab23efd4 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0287.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0287", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-07T23:15:43.607", - "lastModified": "2024-01-08T17:51:58.093", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:11.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0288.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0288.json index b75dc33911a..0ef03c1ae14 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0288.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0288", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T00:15:43.947", - "lastModified": "2024-01-08T17:52:18.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:11.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0289.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0289.json index e1864980160..a4420178acd 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0289.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0289", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T00:15:44.190", - "lastModified": "2024-01-08T17:52:33.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:11.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0290.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0290.json index 492554ba68e..2bc9861cb78 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0290.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0290.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0290", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T01:15:10.607", - "lastModified": "2024-01-08T17:52:47.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0291.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0291.json index 342f43223ab..62e0ec3eff1 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0291.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0291", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T01:15:10.850", - "lastModified": "2024-01-11T15:58:47.450", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0292.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0292.json index fc23c15de46..452389f7292 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0292.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0292", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T02:15:14.367", - "lastModified": "2024-01-11T16:59:08.770", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0293.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0293.json index 10f728223ea..3b8a768933f 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0293.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0293.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0293", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T03:15:13.820", - "lastModified": "2024-01-11T16:58:37.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0294.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0294.json index 5cfe15c1939..ec78368eec6 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0294.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0294.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0294", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T03:15:14.050", - "lastModified": "2024-01-11T16:56:53.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0295.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0295.json index 0ee61b759af..9cfd2d52c16 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0295.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0295.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0295", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T04:15:08.287", - "lastModified": "2024-01-11T16:56:41.500", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0296.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0296.json index 83ddd4e25b7..a76dca8b16f 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0296.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0296", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T04:15:08.540", - "lastModified": "2024-01-11T16:56:28.763", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0297.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0297.json index 508222c220f..d0ff4ff3896 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0297.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0297.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0297", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T05:15:09.393", - "lastModified": "2024-02-08T09:15:45.773", + "lastModified": "2024-02-09T19:15:12.823", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0298.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0298.json index fae7ad00bca..0dbfe28cd1d 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0298.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0298.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0298", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T05:15:09.770", - "lastModified": "2024-01-11T16:55:37.693", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:12.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0299.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0299.json index 4b6507b6618..85fd26b0855 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0299.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0299", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T06:15:44.593", - "lastModified": "2024-01-11T16:55:13.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0301.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0301.json index 3bd80d99375..a28cf7b1d35 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0301.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0301", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T07:15:08.767", - "lastModified": "2024-01-11T18:50:32.310", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0302.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0302.json index cd7eb7999c3..c94bf7a151f 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0302.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0302", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T07:15:10.597", - "lastModified": "2024-01-11T18:52:04.270", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0303.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0303.json index 50306cfc64b..8fd016451c9 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0303.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0303.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0303", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T08:15:36.400", - "lastModified": "2024-01-11T18:58:18.753", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0304.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0304.json index ee751108ba4..f197fe1a33c 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0304.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0304", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T08:15:36.737", - "lastModified": "2024-01-11T18:53:13.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0308.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0308.json index 167bf8c73fe..e8cec3d2992 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0308.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0308", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T10:15:11.560", - "lastModified": "2024-01-12T13:24:38.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0325.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0325.json index 273f94d79e2..63b7b6c0734 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0325.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0325.json @@ -2,16 +2,40 @@ "id": "CVE-2024-0325", "sourceIdentifier": "security@puppet.com", "published": "2024-02-01T22:15:55.333", - "lastModified": "2024-02-01T22:39:14.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:48:49.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Helix Sync versions prior to 2024.1, a local command injection was identified. Reported by Bryan Riggins. \u00a0\n" + }, + { + "lang": "es", + "value": "En las versiones de Helix Sync anteriores a la 2024.1, se identific\u00f3 una inyecci\u00f3n de comando local. Reportado por Bryan Riggins." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@puppet.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "security@puppet.com", "type": "Secondary", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perforce:helix_sync:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1", + "matchCriteriaId": "F9EE18B4-FEBF-4E76-B25A-0EC7CE606187" + } + ] + } + ] + } + ], "references": [ { "url": "https://perforce.com", - "source": "security@puppet.com" + "source": "security@puppet.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0338.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0338.json index f27479d2d38..9d75275f7ea 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0338.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0338", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-02T10:15:08.370", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:28:45.703", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "cve-coordination@incibe.es", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apachefriends:xampp:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8.2.4", + "matchCriteriaId": "7DF079BC-A321-4821-B6AF-65D5EAB08EB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-vulnerability-xampp", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0341.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0341.json index 6d83d2ec85d..ecc58d0f831 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0341.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0341.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0341", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T19:15:11.023", - "lastModified": "2024-01-16T19:49:56.160", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0342.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0342.json index 36a110934ee..845eb988d04 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0342.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0342.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0342", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T20:15:43.190", - "lastModified": "2024-01-16T19:33:17.373", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0344.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0344.json index c0647254183..68b8cca16a3 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0344.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0344.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0344", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T21:15:08.123", - "lastModified": "2024-01-16T19:29:05.160", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:13.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0352.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0352.json index b63bc5cf0e4..6f7ff041d8f 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0352.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0352", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T23:15:10.403", - "lastModified": "2024-01-17T01:23:10.833", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0354.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0354.json index 8213627016f..e49d88ad351 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0354.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0354", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-10T00:15:45.950", - "lastModified": "2024-01-17T01:14:56.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0357.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0357.json index e9e9d6150bf..3eaea686595 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0357.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0357.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0357", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-10T01:15:43.460", - "lastModified": "2024-01-16T21:09:00.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0358.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0358.json index e1481526bea..52b4ba6d22b 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0358.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0358", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-10T01:15:43.663", - "lastModified": "2024-01-16T21:04:17.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0411.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0411.json index bbb66f6b259..a8b9f8efb3a 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0411.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0411.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0411", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T17:15:08.617", - "lastModified": "2024-01-18T18:46:08.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0412.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0412.json index 8bd4d7799d8..cfce3ce70cd 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0412.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0412", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T17:15:08.843", - "lastModified": "2024-01-18T20:20:05.993", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0413.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0413.json index 9bcbf83a842..12eae509a63 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0413.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0413.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0413", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T17:15:09.060", - "lastModified": "2024-01-18T20:12:44.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.673", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0414.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0414.json index 60b88d7bfdc..4714728041a 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0414.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0414.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0414", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T17:15:09.280", - "lastModified": "2024-01-18T20:11:45.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0415.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0415.json index c4e2a9f4649..e99cf5ac04f 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0415.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0415", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T18:15:44.223", - "lastModified": "2024-01-18T20:10:13.733", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0416.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0416.json index 4cc81395f76..1412fac482c 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0416.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0416.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0416", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T18:15:44.460", - "lastModified": "2024-01-18T20:09:52.287", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:14.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0417.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0417.json index ca9059bc62c..a476a634735 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0417.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0417.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0417", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-11T18:15:44.687", - "lastModified": "2024-01-18T20:07:08.083", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0460.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0460.json index 63acc5385ea..09c24c9ae47 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0460.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0460.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0460", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T16:15:52.577", - "lastModified": "2024-01-18T20:37:41.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0461.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0461.json index c7bbb57e15a..390fcb7ceca 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0461.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0461", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T17:15:09.780", - "lastModified": "2024-01-18T15:36:57.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0462.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0462.json index 7a5e4ca532e..f72a86b8693 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0462.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0462", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T18:15:46.687", - "lastModified": "2024-01-18T15:37:50.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0463.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0463.json index 3612fdfd42e..f5f3f3045aa 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0463.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0463", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T18:15:46.913", - "lastModified": "2024-01-18T15:38:05.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0464.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0464.json index 036bc419aef..23ca42c2e8e 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0464.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0464", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T19:15:11.777", - "lastModified": "2024-01-20T18:47:32.230", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0465.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0465.json index f3d74a6a91c..922378c6918 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0465.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0465", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T19:15:12.577", - "lastModified": "2024-01-20T18:47:17.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0466.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0466.json index 9cf6db485f7..3249aef7bf5 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0466.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0466", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T19:15:12.920", - "lastModified": "2024-01-20T18:46:47.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0467.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0467.json index 6999724df3b..983ab1367c1 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0467.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0467", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T20:15:47.177", - "lastModified": "2024-01-18T15:38:31.063", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:15.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0468.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0468.json index 9661f2f23f8..06bc07885f7 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0468.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0468", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T21:15:10.350", - "lastModified": "2024-01-17T18:30:21.263", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0469.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0469.json index 9937d5c7868..2bb85145fde 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0469.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0469.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0469", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T21:15:10.573", - "lastModified": "2024-01-17T18:29:59.303", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json index ec168ac7152..e7bdac33896 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0470", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T21:15:10.800", - "lastModified": "2024-02-02T02:47:35.793", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json index 99704ba0675..e3abcd847f5 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0471", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T21:15:11.050", - "lastModified": "2024-02-02T02:48:16.190", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0472.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0472.json index 1bff12cf9ba..154551981a8 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0472.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0472.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0472", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T22:15:45.323", - "lastModified": "2024-01-19T14:17:12.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.483", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0473.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0473.json index 59dfae9927a..7be7207c8c5 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0473.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0473", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T22:15:45.533", - "lastModified": "2024-01-19T14:16:50.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0474.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0474.json index 9936e6077af..9e055b3572e 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0474.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0474", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-12T23:15:08.890", - "lastModified": "2024-01-19T14:23:04.517", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0475.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0475.json index 9129ca7964f..7b6cd1d4654 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0475.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0475.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0475", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T00:15:43.943", - "lastModified": "2024-01-19T14:16:32.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0477.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0477.json index 5701f3c2b1f..91fecef8c8d 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0477.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0477", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T06:15:49.150", - "lastModified": "2024-01-19T14:20:29.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:16.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0478.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0478.json index 912a0ce5fc7..31c4a974837 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0478.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0478", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T07:15:07.327", - "lastModified": "2024-01-19T14:20:44.160", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0479.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0479.json index ed5c88e04e0..2f828ea5c3b 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0479.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0479", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T07:15:08.857", - "lastModified": "2024-01-24T16:41:00.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0480.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0480.json index 9db181fa2db..83a15aae233 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0480.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0480.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0480", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T08:15:07.080", - "lastModified": "2024-01-24T16:41:55.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -114,15 +114,6 @@ } ], "references": [ - { - "url": "http://packetstormsecurity.com/files/176548/Taokeyun-SQL-Injection.html", - "source": "cna@vuldb.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, { "url": "https://note.zhaoj.in/share/0KtyJccrP3Ba", "source": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0481.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0481.json index d425c724867..dea79e1664d 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0481.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0481", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T09:15:07.300", - "lastModified": "2024-01-24T16:43:30.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0482.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0482.json index 53973d0405c..f108667eb6e 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0482.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0482.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0482", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T10:15:07.790", - "lastModified": "2024-01-24T16:52:03.103", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0483.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0483.json index 4c6e4bd6985..81a1fb59af7 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0483.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0483.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0483", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T10:15:08.423", - "lastModified": "2024-01-24T16:57:10.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0484.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0484.json index ef11154eb57..2fd3a02728a 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0484.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0484", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T11:15:12.030", - "lastModified": "2024-01-19T14:23:24.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0485.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0485.json index 3be31d52a98..4da80ea1151 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0485.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0485", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T11:15:12.937", - "lastModified": "2024-01-19T14:22:14.600", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0486.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0486.json index 56484a2c54d..f1a736c0112 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0486.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0486", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T12:15:41.367", - "lastModified": "2024-01-19T14:21:56.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0487.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0487.json index 56a5305d18f..857a3a599ec 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0487.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0487", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T13:15:07.963", - "lastModified": "2024-01-19T14:21:39.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:17.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0488.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0488.json index 7bbc8db1008..5f09cca37ea 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0488.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0488", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T13:15:08.237", - "lastModified": "2024-01-19T14:21:21.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0489.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0489.json index 1382e61ba1e..9fb439eadcc 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0489.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0489.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0489", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T14:15:45.780", - "lastModified": "2024-01-19T14:21:03.633", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0490.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0490.json index bf5e04ae306..6ab5720b88d 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0490.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0490.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0490", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T14:15:46.067", - "lastModified": "2024-01-22T19:24:45.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.310", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0491.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0491.json index 295b57c5946..70c99845586 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0491.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0491", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T15:15:08.503", - "lastModified": "2024-01-22T19:26:12.493", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.410", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0497.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0497.json index 929fa671100..cc4f2e34797 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0497.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0497", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T18:15:43.807", - "lastModified": "2024-01-19T18:55:21.660", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.543", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0498.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0498.json index 363bb6d17fc..336558093bd 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0498.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0498", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T18:15:44.150", - "lastModified": "2024-01-18T19:28:00.403", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0510.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0510.json index c8cd0995bb4..b5d7eeee2b2 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0510.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0510.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0510", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-13T22:15:45.180", - "lastModified": "2024-01-22T19:23:27.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -124,15 +124,6 @@ } ], "references": [ - { - "url": "http://packetstormsecurity.com/files/176547/HaoKeKeJi-YiQiNiu-Server-Side-Request-Forgery.html", - "source": "cna@vuldb.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, { "url": "https://note.zhaoj.in/share/gBtNhBb39u9u", "source": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json index 342f4103d0b..593d11e7152 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0524", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T00:15:37.343", - "lastModified": "2024-01-19T17:08:38.220", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json index fcc6e2cf4cb..5fc30118c20 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0525.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0525", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T00:15:37.590", - "lastModified": "2024-01-19T17:08:24.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:18.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json index 2bb646201e2..6913fae468c 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0526.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0526", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T00:15:37.807", - "lastModified": "2024-01-19T17:08:12.093", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0527.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0527.json index ac35821bb85..e32eddb64d8 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0527.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0527", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T01:15:42.540", - "lastModified": "2024-01-19T17:07:53.900", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0528.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0528.json index acbd583233f..92f350d3802 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0528.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0528", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T01:15:42.773", - "lastModified": "2024-01-19T17:07:30.057", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0529.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0529.json index a8cdd7ec7e6..41720b3a85d 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0529.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0529.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0529", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T02:15:14.963", - "lastModified": "2024-01-19T17:07:17.820", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0530.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0530.json index d685f85f4ec..8d36e562f39 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0530.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0530.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0530", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T02:15:15.197", - "lastModified": "2024-01-19T19:06:33.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0535.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0535.json index eff4b8685b9..94e9bdd1e9e 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0535.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0535", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T03:15:09.083", - "lastModified": "2024-01-22T19:32:08.933", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0536.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0536.json index 5165d667293..df93f6bf864 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0536.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0536", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T04:15:07.547", - "lastModified": "2024-01-19T17:11:48.133", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0537.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0537.json index 6c9d56f35de..c2794ce5f00 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0537.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0537", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T04:15:07.787", - "lastModified": "2024-01-19T17:11:31.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0538.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0538.json index 5aea495f48d..f0d1e6e28e1 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0538.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0538", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T04:15:08.033", - "lastModified": "2024-01-19T17:11:20.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:19.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0539.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0539.json index 88869d43e4a..fb2d22a47d3 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0539.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0539.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0539", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T05:15:08.183", - "lastModified": "2024-01-19T17:11:05.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0540.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0540.json index 720ffcd57cb..aa60cbe12ce 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0540.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0540.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0540", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T05:15:08.583", - "lastModified": "2024-01-19T17:10:26.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0541.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0541.json index 193b963ec02..36d9372cc3c 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0541.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0541", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T05:15:08.913", - "lastModified": "2024-01-19T17:10:15.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0542.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0542.json index d1065c88134..5ecfe10c094 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0542.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0542", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-15T05:15:09.297", - "lastModified": "2024-01-19T17:09:55.493", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0571.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0571.json index 98597c821ac..46a48fe8174 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0571.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0571", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T14:15:48.960", - "lastModified": "2024-01-19T19:34:35.653", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.523", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0572.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0572.json index bcf71f9435d..3b690c83abb 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0572.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0572", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T14:15:49.227", - "lastModified": "2024-01-19T19:57:57.770", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0573.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0573.json index 70af8294795..287edae6c77 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0573.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0573", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T15:15:08.863", - "lastModified": "2024-01-19T20:11:12.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0574.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0574.json index ed551f00a3f..6c5b6f1e257 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0574.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0574", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T15:15:09.097", - "lastModified": "2024-01-19T20:14:25.070", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0575.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0575.json index fa01fe4d51f..fc529d3b8bf 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0575.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0575", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T15:15:09.327", - "lastModified": "2024-01-19T19:35:57.170", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:20.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0576.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0576.json index 30e593d5c7d..c9493db9f0d 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0576.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0576", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T16:15:14.557", - "lastModified": "2024-01-19T19:38:56.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0577.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0577.json index 791e857467a..3356662b8e5 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0577.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0577", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T16:15:14.787", - "lastModified": "2024-01-19T19:42:36.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0578.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0578.json index 2f353ae2489..a9b64bce08d 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0578.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0578", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T16:15:15.020", - "lastModified": "2024-01-19T19:53:21.670", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json index 1061422af0d..0ee726f4022 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0579", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T17:15:08.280", - "lastModified": "2024-01-19T20:08:29.650", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0603.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0603.json index 0a855a5c9fe..940cbf09932 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0603.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0603", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-16T22:15:38.040", - "lastModified": "2024-01-23T16:46:16.820", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0648.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0648.json index 2325d07ea34..faa821b86ed 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0648.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0648", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-17T23:15:08.197", - "lastModified": "2024-01-24T20:50:45.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0649.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0649.json index 898354cb562..8b9d852af76 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0649.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0649.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0649", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-17T23:15:08.660", - "lastModified": "2024-01-25T01:31:46.630", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0654.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0654.json index e0063966a23..bbfc4f51af5 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0654.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0654", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-18T01:15:44.347", - "lastModified": "2024-01-26T13:40:11.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:21.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json index 6f319c67e21..6ad305baec0 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0733", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T21:15:08.703", - "lastModified": "2024-01-26T16:03:13.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json index 95e438ff643..7d89b9fb9ae 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0734", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T21:15:08.923", - "lastModified": "2024-01-26T16:57:32.447", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json index a7d3c71990a..79492f2cc1f 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0739", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-19T22:15:08.217", - "lastModified": "2024-01-26T15:44:57.530", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.263", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0935.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0935.json index 703fe412033..8c3b7550225 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0935.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0935.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0935", "sourceIdentifier": "3DS.Information-Security@3ds.com", "published": "2024-02-01T14:15:56.040", - "lastModified": "2024-02-09T15:15:08.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-02-09T20:22:43.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "3DS.Information-Security@3ds.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + }, { "source": "3DS.Information-Security@3ds.com", "type": "Secondary", @@ -50,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3ds:delmia_apriso:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2019", + "versionEndIncluding": "2024", + "matchCriteriaId": "2519F764-CF85-4E0F-BE9E-B31257A83DE8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.3ds.com/vulnerability/advisories", - "source": "3DS.Information-Security@3ds.com" + "source": "3DS.Information-Security@3ds.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0937.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0937.json index 0b89fbb8c51..633dd732131 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0937.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0937.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0937", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-26T18:15:10.487", - "lastModified": "2024-02-01T15:50:38.727", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0945.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0945.json index 943e4b9861d..b9d0fd989cc 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0945.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0945", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-26T21:15:08.380", - "lastModified": "2024-02-01T21:20:25.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0946.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0946.json index 08327217d1a..d1ebb6a6b9a 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0946.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0946", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-26T21:15:08.600", - "lastModified": "2024-02-01T21:20:11.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json index 700c5b051cf..23e2c47e49a 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0960", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-27T12:15:07.903", - "lastModified": "2024-02-02T02:19:05.557", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0987.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0987.json index f7a4a4876f4..4f0294b9c12 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0987.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0987", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T00:15:08.143", - "lastModified": "2024-02-02T15:32:31.593", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0988.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0988.json index 08c3180aa5c..19a37c63a2b 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0988.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0988", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T00:15:08.403", - "lastModified": "2024-02-02T15:32:49.800", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:22.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0989.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0989.json index d9486d05dab..4024b6cd9ea 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0989.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0989", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T01:15:07.890", - "lastModified": "2024-02-02T15:33:08.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-09T19:15:23.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1005.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1005.json index a5e7a520292..70b6f60aed7 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1005.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1005.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1005", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T15:15:10.510", - "lastModified": "2024-02-09T11:15:08.600", + "lastModified": "2024-02-09T19:15:23.177", "vulnStatus": "Undergoing Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1006.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1006.json index 3a04a0d2228..9de23e71026 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1006.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1006.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1006", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-29T16:15:08.307", - "lastModified": "2024-02-09T11:15:08.907", + "lastModified": "2024-02-09T19:15:23.300", "vulnStatus": "Undergoing Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1032.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1032.json index a6eb2edffec..e2a857c9b52 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1032.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1032.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1032", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-30T14:15:47.577", - "lastModified": "2024-02-09T11:15:09.003", + "lastModified": "2024-02-09T19:15:23.413", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1033.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1033.json index 9d76ed2e42f..2b1247ed3f3 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1033.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1033.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1033", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-30T14:15:47.853", - "lastModified": "2024-02-09T11:15:09.180", + "lastModified": "2024-02-09T19:15:23.547", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1034.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1034.json index f2bc9c72448..f1f6b0de2c2 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1034.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1034.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1034", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-30T15:15:08.933", - "lastModified": "2024-02-09T11:15:09.303", + "lastModified": "2024-02-09T19:15:23.663", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1035.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1035.json index d7da23f7850..2323d95d30e 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1035.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1035.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1035", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-30T16:15:47.350", - "lastModified": "2024-02-09T11:15:09.410", + "lastModified": "2024-02-09T19:15:23.787", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1036.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1036.json index 31c6386d6b4..b0d169103ce 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1036.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1036", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-30T18:15:47.300", - "lastModified": "2024-02-09T11:15:09.523", + "lastModified": "2024-02-09T19:15:23.923", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json index 78ec28d15be..34d8d3b0f48 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1113.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1113", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.140", - "lastModified": "2024-02-09T11:15:09.630", + "lastModified": "2024-02-09T20:15:53.813", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json index 39362264cb0..cad15e4d6b3 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1114.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1114", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.367", - "lastModified": "2024-02-09T11:15:09.760", + "lastModified": "2024-02-09T20:15:53.917", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json index ef822932f0e..a33713c0e71 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1115.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1115", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.590", - "lastModified": "2024-02-09T11:15:09.870", + "lastModified": "2024-02-09T19:15:24.063", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json index e05cb6fecc4..3cdc7623c81 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1116.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1116", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T20:15:45.807", - "lastModified": "2024-02-09T11:15:09.980", + "lastModified": "2024-02-09T20:15:54.017", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json index 08c5a9e20c4..d5bdf9f53f0 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1117.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1117", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-31T21:15:08.500", - "lastModified": "2024-02-09T11:15:10.087", + "lastModified": "2024-02-09T20:15:54.117", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1141.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1141.json index 52134a26db2..64009d24873 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1141.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1141.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1141", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-01T15:15:08.547", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:22:03.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in python-glance-store. The issue occurs when the package logs the access_key for the glance-store when the DEBUG log level is enabled." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en python-glance-store. El problema ocurre cuando el paquete registra la clave de acceso para el almac\u00e9n de vistazo cuando el nivel de registro DEBUG est\u00e1 habilitado." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,14 +80,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openstack:glacne_store:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DBA90AF-8622-4811-98AE-D7732D4A563A" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-1141", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258836", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1143.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1143.json index 6b438841a60..c793e438b73 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1143.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1143.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1143", "sourceIdentifier": "dl_cve@linecorp.com", "published": "2024-02-02T06:15:45.360", - "lastModified": "2024-02-06T07:15:10.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:08:27.423", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "dl_cve@linecorp.com", "type": "Secondary", @@ -38,10 +58,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linecorp:central_dogma:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.64.1", + "matchCriteriaId": "81505A16-D8BF-483C-BED9-59BABC8B62DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/line/centraldogma/security/advisories/GHSA-34q3-p352-c7q8", - "source": "dl_cve@linecorp.com" + "source": "dl_cve@linecorp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1167.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1167.json index 60b7f1fca2d..0902dcda474 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1167.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1167.json @@ -2,16 +2,40 @@ "id": "CVE-2024-1167", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-02-01T18:15:53.637", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:20:51.900", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\nWhen SEW-EURODRIVE MOVITOOLS MotionStudio processes XML information unrestricted file access can occur.\n\n" + }, + { + "lang": "es", + "value": "Cuando SEW-EURODRIVE MOVITOOLS MotionStudio procesa informaci\u00f3n XML, se puede acceder sin restricciones a los archivos." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seweurodrive:movitools_motionstudio:6.5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "12CC889F-0ECB-4127-BF4C-C9496B0C5884" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-016-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.seweurodrive.com/contact_us/contact_us.html", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1184.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1184.json index 442031b6470..6dbc08dc10d 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1184.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1184", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-02T13:15:10.050", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:15:35.037", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,18 +95,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nsasoft:network_sleuth:3.0.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A03D0E8B-066C-495A-97CB-342F2397B3F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://fitoxs.com/vuldb/10-exploit-perl.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.252674", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.252674", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1198.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1198.json index 599f54098aa..de7c724e1c4 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1198.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1198.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1198", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-03T00:15:44.220", - "lastModified": "2024-02-09T11:15:10.197", + "lastModified": "2024-02-09T20:15:54.207", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1201.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1201.json index bcb7889f7c0..96bd1581297 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1201.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1201", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-02T12:15:49.357", - "lastModified": "2024-02-02T13:36:23.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:27:29.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:panterasoft:hdd_health:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.2.0.112", + "matchCriteriaId": "B863BB2C-BD8B-4647-93FB-749C1761DED8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/panterasoft-hdd-health-search-path-or-unquoted-item-vulnerability", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1225.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1225.json index 31943808ebf..282ae82af0f 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1225.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1225.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1225", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-05T13:15:58.977", - "lastModified": "2024-02-09T11:15:10.307", + "lastModified": "2024-02-09T20:15:54.290", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1245.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1245.json new file mode 100644 index 00000000000..634ffed403a --- /dev/null +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1245.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-1245", + "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "published": "2024-02-09T20:15:54.370", + "lastModified": "2024-02-09T20:15:54.370", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Concrete CMS\u00a0version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . \n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1246.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1246.json new file mode 100644 index 00000000000..894311657dd --- /dev/null +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1246.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-1246", + "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "published": "2024-02-09T20:15:54.573", + "lastModified": "2024-02-09T20:15:54.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Concrete CMS\u00a0in version 9 before 9.2.5\u00a0is vulnerable to reflected XSS via the Image URL Import Feature due to\u00a0insufficient validation of administrator provided data. A rogue administrator could inject malicious code when importing images, leading to the execution of the malicious code on the website user\u2019s browser. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . This does not affect Concrete versions prior to version 9.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1247.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1247.json new file mode 100644 index 00000000000..dbc143ac2a6 --- /dev/null +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1247.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-1247", + "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "published": "2024-02-09T19:15:24.183", + "lastModified": "2024-02-09T20:15:54.770", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Concrete CMS version 9 before 9.2.5 is vulnerable to\u00a0\u00a0stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field.\u00a0A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability. \n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/925-release-notes", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://www.concretecms.org/about/project-news/security/2024-02-04-security-advisory", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1258.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1258.json index 216b6284edd..1e4a9d67e20 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1258.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1258.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1258", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T21:15:08.660", - "lastModified": "2024-02-09T11:15:10.410", + "lastModified": "2024-02-09T20:15:54.857", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1259.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1259.json index c42d20721e9..61227400ddd 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1259.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1259.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1259", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T21:15:08.877", - "lastModified": "2024-02-09T11:15:10.517", + "lastModified": "2024-02-09T20:15:54.943", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1260.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1260.json index efebfa04d44..490f54582d4 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1260.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1260.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1260", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T22:16:14.463", - "lastModified": "2024-02-09T11:15:10.617", + "lastModified": "2024-02-09T20:15:55.030", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1261.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1261.json index c2aec4dcf54..34e7c44dfee 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1261.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1261.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1261", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T22:16:14.693", - "lastModified": "2024-02-09T11:15:10.707", + "lastModified": "2024-02-09T20:15:55.113", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1262.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1262.json index dfa03abeae5..f66c851078f 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1262.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1262.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1262", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T23:15:08.190", - "lastModified": "2024-02-09T11:15:10.800", + "lastModified": "2024-02-09T20:15:55.190", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1263.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1263.json index 28dffc47796..f944d09df35 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1263.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1263.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1263", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-06T23:15:08.460", - "lastModified": "2024-02-09T11:15:10.900", + "lastModified": "2024-02-09T20:15:55.277", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1264.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1264.json index b1bef90714a..c4132fe768a 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1264.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1264.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1264", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-07T00:15:55.867", - "lastModified": "2024-02-09T10:15:08.580", + "lastModified": "2024-02-09T20:15:55.367", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22107.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22107.json index 8d0d0366dc5..c92e5d77185 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22107.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22107.json @@ -2,23 +2,86 @@ "id": "CVE-2024-22107", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T16:15:55.090", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:44:32.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GTB Central Console 15.17.1-30814.NG. The method systemSettingsDnsDataAction at /opt/webapp/src/AppBundle/Controller/React/SystemSettingsController.php is vulnerable to command injection via the /old/react/v1/api/system/dns/data endpoint. An authenticated attacker can abuse it to inject an arbitrary command and compromise the platform." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GTB Central Console 15.17.1-30814.NG. El m\u00e9todo systemSettingsDnsDataAction en /opt/webapp/src/AppBundle/Controller/React/SystemSettingsController.php es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s del endpoint /old/react/v1/api/system/dns/data. Un atacante autenticado puede abusar de \u00e9l para inyectar un comando arbitrario y comprometer la plataforma." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gttb:gtb_central_console:15.17.1-30814.ng:*:*:*:*:*:*:*", + "matchCriteriaId": "4EEB5416-1FD1-483F-967F-E75AAFE4EE16" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://adepts.of0x.cc/gtbcc-pwned/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://x-c3ll.github.io/cves.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22108.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22108.json index eea4029d0fa..18ff5e27379 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22108.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22108.json @@ -2,23 +2,86 @@ "id": "CVE-2024-22108", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T16:15:55.167", - "lastModified": "2024-02-02T16:30:16.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:39:12.853", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GTB Central Console 15.17.1-30814.NG. The method setTermsHashAction at /opt/webapp/lib/PureApi/CCApi.class.php is vulnerable to an unauthenticated SQL injection via /ccapi.php that an attacker can abuse in order to change the Administrator password to a known value." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GTB Central Console 15.17.1-30814.NG. El m\u00e9todo setTermsHashAction en /opt/webapp/lib/PureApi/CCApi.class.php es vulnerable a una inyecci\u00f3n SQL no autenticada a trav\u00e9s de /ccapi.php que un atacante puede abusar para cambiar la contrase\u00f1a del administrador a un valor conocido." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gttb:gtb_central_console:15.17.1-30814.ng:*:*:*:*:*:*:*", + "matchCriteriaId": "4EEB5416-1FD1-483F-967F-E75AAFE4EE16" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://adepts.of0x.cc/gtbcc-pwned/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://x-c3ll.github.io/cves.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23832.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23832.json index dac71e5dd8a..f66ae1260dc 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23832.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23832.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23832", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T17:15:10.677", - "lastModified": "2024-02-02T15:15:09.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:21:45.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,18 +70,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.5.17", + "matchCriteriaId": "B3D78571-45F8-4E22-80CB-67190F74AEDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.13", + "matchCriteriaId": "B4FE237D-083C-4D44-BEFC-AFE77F1A9B94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.13", + "matchCriteriaId": "80BD3026-2541-470E-85F2-61ACFD318C9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.5", + "matchCriteriaId": "CC484C16-EA4D-48EC-A03D-1D8DCB89AAB8" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/02/4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://github.com/mastodon/mastodon/commit/1726085db5cd73dd30953da858f9887bcc90b958", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mastodon/mastodon/security/advisories/GHSA-3fjr-858r-92rw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24557.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24557.json index 0f315189537..cc952e5aa30 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24557.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24557.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24557", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T17:15:10.953", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:21:32.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Moby is an open-source project created by Docker to enable software containerization. The classic builder cache system is prone to cache poisoning if the image is built FROM scratch. Also, changes to some instructions (most important being HEALTHCHECK and ONBUILD) would not cause a cache miss. An attacker with the knowledge of the Dockerfile someone is using could poison their cache by making them pull a specially crafted image that would be considered as a valid cache candidate for some build steps. 23.0+ users are only affected if they explicitly opted out of Buildkit (DOCKER_BUILDKIT=0 environment variable) or are using the /build API endpoint. All users on versions older than 23.0 could be impacted. Image build API endpoint (/build) and ImageBuild function from github.com/docker/docker/client is also affected as it the uses classic builder by default. Patches are included in 24.0.9 and 25.0.2 releases." + }, + { + "lang": "es", + "value": "Moby es un proyecto de c\u00f3digo abierto creado por Docker para permitir la contenedorizaci\u00f3n de software. El sistema de cach\u00e9 del constructor cl\u00e1sico es propenso a envenenar el cach\u00e9 si la imagen se crea DESDE scratch. Adem\u00e1s, los cambios en algunas instrucciones (las m\u00e1s importantes son HEALTHCHECK y ONBUILD) no provocar\u00edan una p\u00e9rdida de cach\u00e9. Un atacante con conocimiento del Dockerfile que alguien est\u00e1 usando podr\u00eda envenenar su cach\u00e9 al obligarlo a extraer una imagen especialmente manipulada que se considerar\u00eda como un candidato de cach\u00e9 v\u00e1lido para algunos pasos de compilaci\u00f3n. Los usuarios de 23.0+ solo se ven afectados si optaron expl\u00edcitamente por no participar en Buildkit (variable de entorno DOCKER_BUILDKIT=0) o si est\u00e1n usando el endpoint API /build. Todos los usuarios con versiones anteriores a la 23.0 podr\u00edan verse afectados. El punto final de la API de creaci\u00f3n de im\u00e1genes (/build) y la funci\u00f3n ImageBuild de github.com/docker/docker/client tambi\u00e9n se ven afectados ya que utiliza el generador cl\u00e1sico de forma predeterminada. Los parches se incluyen en las versiones 24.0.9 y 25.0.2." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,14 +84,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.0.9", + "matchCriteriaId": "8334C2EE-69C4-42D5-89C3-00C77A880F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "25.0.0", + "versionEndExcluding": "25.0.2", + "matchCriteriaId": "D9331CA9-E92E-4D37-8C87-92F6D4418C4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24561.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24561.json index 777eb05c81f..eeede796240 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24561.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24561.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24561", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T17:15:11.180", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:21:23.980", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.10 and earlier, the bounds check for slices does not account for the ability for start + length to overflow when the values aren't literals. If a slice() function uses a non-literal argument for the start or length variable, this creates the ability for an attacker to overflow the bounds check. This issue can be used to do OOB access to storage, memory or calldata addresses. It can also be used to corrupt the length slot of the respective array.\n\n" + }, + { + "lang": "es", + "value": "Vyper es un lenguaje de contrato inteligente de python para la m\u00e1quina virtual ethereum. En las versiones 0.3.10 y anteriores, la verificaci\u00f3n de los l\u00edmites para sectores no tiene en cuenta la capacidad de inicio + longitud de desbordarse cuando los valores no son literales. Si una funci\u00f3n slice() utiliza un argumento no literal para la variable de inicio o longitud, esto crea la capacidad para que un atacante desborde la verificaci\u00f3n de los l\u00edmites. Este problema se puede utilizar para realizar acceso OOB a direcciones de almacenamiento, memoria o datos de llamada. Tambi\u00e9n se puede utilizar para corromper la ranura de longitud de la matriz respectiva." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +80,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*", + "versionEndIncluding": "0.3.10", + "matchCriteriaId": "832C489D-4288-46B4-A29E-0E7168748042" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vyperlang/vyper/blob/b01cd686aa567b32498fefd76bd96b0597c6f099/vyper/builtins/functions.py#L404-L457", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/vyperlang/vyper/issues/3756", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24569.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24569.json index 4b8bf8b6725..0bf83969c77 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24569.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24569.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24569", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T19:15:08.360", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:15:06.707", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Pixee Java Code Security Toolkit is a set of security APIs meant to help secure Java code. `ZipSecurity#isBelowCurrentDirectory` is vulnerable to a partial-path traversal bypass. To be vulnerable to the bypass, the application must use toolkit version <=1.1.1, use ZipSecurity as a guard against path traversal, and have an exploit path. Although the control still protects attackers from escaping the application path into higher level directories (e.g., /etc/), it will allow \"escaping\" into sibling paths. For example, if your running path is /my/app/path you an attacker could navigate into /my/app/path-something-else. This vulnerability is patched in 1.1.2.\n\n" + }, + { + "lang": "es", + "value": "Pixee Java Code Security Toolkit es un conjunto de API de seguridad destinadas a ayudar a proteger el c\u00f3digo Java. `ZipSecurity#isBelowCurrentDirectory` es vulnerable a una omisi\u00f3n de partial-path traversal. Para ser vulnerable a la omisi\u00f3n, la aplicaci\u00f3n debe utilizar la versi\u00f3n del kit de herramientas <=1.1.1, utilizar ZipSecurity como protecci\u00f3n contra el path traversal y tener una ruta de explotaci\u00f3n. Aunque el control todav\u00eda protege a los atacantes de escapar de la ruta de la aplicaci\u00f3n a directorios de nivel superior (por ejemplo, /etc/), permitir\u00e1 \"escapar\" a rutas hermanas. Por ejemplo, si su ruta de ejecuci\u00f3n es /my/app/path, un atacante podr\u00eda navegar hasta /my/app/path-something-else. Esta vulnerabilidad est\u00e1 parcheada en 1.1.2." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +70,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixee:java_code_security_toolkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.2", + "matchCriteriaId": "52A0BFC8-27EE-4122-8AFC-B652D0B6F11B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pixee/java-security-toolkit/blob/7c8e93e6fb2420fb6003c54a741e267c4f883bab/src/main/java/io/github/pixee/security/ZipSecurity.java#L82-L87", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pixee/java-security-toolkit/commit/b885b03c9cfae53d62d239037f9654d973dd54d9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pixee/java-security-toolkit/security/advisories/GHSA-qh4g-4m4w-jgv2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json index d68e9a903ef..c87f9d2ebbc 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24570.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24570", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T17:15:11.403", - "lastModified": "2024-02-01T21:30:44.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T20:21:06.250", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Statamic is a Laravel and Git powered CMS. HTML files crafted to look like jpg files are able to be uploaded, allowing for XSS. This affects the front-end forms with asset fields without any mime type validation, asset fields in the control panel, and asset browser in the control panel. Additionally, if the XSS is crafted in a specific way, the \"copy password reset link\" feature may be exploited to gain access to a user's password reset token and gain access to their account. The authorized user is required to execute the XSS in order for the vulnerability to occur. In versions 4.46.0 and 3.4.17, the XSS vulnerability has been patched, and the copy password reset link functionality has been disabled. " + }, + { + "lang": "es", + "value": "Statamic es un CMS impulsado por Laravel y Git. Los archivos HTML manipulados para que parezcan archivos jpg se pueden cargar, lo que permite XSS. Esto afecta a los formularios de front-end con campos de activos sin ninguna validaci\u00f3n de tipo MIME, campos de activos en el panel de control y navegador de activos en el panel de control. Adem\u00e1s, si el XSS est\u00e1 manipulado de una manera espec\u00edfica, la funci\u00f3n \"copy password reset link\" puede aprovecharse para obtener acceso al token de restablecimiento de contrase\u00f1a de un usuario y acceder a su cuenta. Se requiere que el usuario autorizado ejecute el XSS para que se produzca la vulnerabilidad. En las versiones 4.46.0 y 3.4.17, se parch\u00f3 la vulnerabilidad XSS y se deshabilit\u00f3 la funci\u00f3n de copia del enlace de restablecimiento de contrase\u00f1a." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +70,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.17", + "matchCriteriaId": "DC3A732A-A505-4E9C-9AB9-8E2AE3743A0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.46.0", + "matchCriteriaId": "EB79DCD7-AC33-4369-BAE3-CC27BAFC12CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/statamic/cms/security/advisories/GHSA-vqxq-hvxw-9mv9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24755.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24755.json index 017504e61c5..8621cdb7457 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24755.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24755.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24755", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T22:15:55.900", - "lastModified": "2024-02-01T22:39:14.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:47:59.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "discourse-group-membership-ip-block is a discourse plugin that adds support for adding users to groups based on their IP address. discourse-group-membership-ip-block was sending all group custom fields to the client, including group custom fields from other plugins which may expect their custom fields to remain secret." + }, + { + "lang": "es", + "value": "discourse-group-membership-ip-block es un complemento de discourse que agrega soporte para agregar usuarios a grupos seg\u00fan su direcci\u00f3n IP. discourse-group-membership-ip-block estaba enviando todos los campos personalizados del grupo al cliente, incluidos los campos personalizados del grupo de otros complementos que pueden esperar que sus campos personalizados permanezcan en secreto." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +80,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:discourse:group_membership_ip_blocks:-:*:*:*:*:*:*:*", + "matchCriteriaId": "492C9419-3CF5-418E-8FA1-78CA1C2B5E31" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/discourse/discourse-group-membership-ip-block/commit/b394d61b0bdfd18a2d8310aa5cf26cccf8bd31c1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/discourse/discourse-group-membership-ip-block/security/advisories/GHSA-r38c-cp8w-664m", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json index d9e26df295b..d668659e6bf 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24756.json @@ -2,16 +2,40 @@ "id": "CVE-2024-24756", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-01T23:15:11.210", - "lastModified": "2024-02-02T01:57:57.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-09T19:47:10.213", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Crafatar serves Minecraft avatars based on the skin for use in external applications. Files outside of the `lib/public/` directory can be requested from the server. Instances running behind Cloudflare (including crafatar.com) are not affected. Instances using the Docker container as shown in the README are affected, but only files within the container can be read. By default, all of the files within the container can also be found in this repository and are not confidential. This vulnerability is patched in 2.1.5." + }, + { + "lang": "es", + "value": "Crafatar ofrece avatares de Minecraft basados en la apariencia para su uso en aplicaciones externas. Los archivos fuera del directorio `lib/public/` se pueden solicitar desde el servidor. Las instancias que se ejecutan detr\u00e1s de Cloudflare (incluido crafatar.com) no se ven afectadas. Las instancias que utilizan el contenedor Docker como se muestra en el archivo README se ven afectadas, pero solo se pueden leer los archivos dentro del contenedor. De forma predeterminada, todos los archivos del contenedor tambi\u00e9n se pueden encontrar en este repositorio y no son confidenciales. Esta vulnerabilidad est\u00e1 parcheada en 2.1.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +80,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crafatar:crafatar:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "CBFA1552-D4BE-4660-8B70-260EA05E6D56" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/crafatar/crafatar/blob/e0233f2899a3206a817d2dd3b80da83d51c7a726/lib/server.js#L64-L67", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/crafatar/crafatar/commit/bba004acc725b362a5d2d5dfe30cf60e7365a373", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/crafatar/crafatar/security/advisories/GHSA-5cxq-25mp-q5f2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json index f1c3c88f132..5cf117e6c53 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24762.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24762", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T15:15:09.260", - "lastModified": "2024-02-05T18:25:55.213", + "lastModified": "2024-02-09T19:15:24.483", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python type hints. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests. It's a ReDoS(Regular expression Denial of Service), it only applies to those reading form data, using `python-multipart`. This vulnerability has been patched in version 0.109.0." + "value": "FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python type hints. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests. It's a ReDoS(Regular expression Denial of Service), it only applies to those reading form data, using `python-multipart`. This vulnerability has been patched in version 0.109.1." + }, + { + "lang": "es", + "value": "FastAPI es un framework web para crear API con Python 3.8+ basado en sugerencias de tipo est\u00e1ndar de Python. Cuando se utilizan datos de formulario, `python-multipart` usa una expresi\u00f3n regular para analizar el encabezado HTTP `Content-Type`, incluidas las opciones. Un atacante podr\u00eda enviar una opci\u00f3n de \"Tipo de contenido\" personalizada que es muy dif\u00edcil de procesar para RegEx, consumiendo recursos de CPU y deteni\u00e9ndose indefinidamente (minutos o m\u00e1s) mientras se mantiene el bucle de evento principal. Esto significa que el proceso no puede manejar m\u00e1s solicitudes. Es un ReDoS (expresi\u00f3n regular de denegaci\u00f3n de servicio), solo se aplica a aquellos que leen datos del formulario usando `python-multipart`. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 0.109.0." } ], "metrics": { diff --git a/README.md b/README.md index 7c530f4f025..8f62c66f76a 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-09T19:00:24.636728+00:00 +2024-02-09T21:00:25.541900+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-09T18:50:58.027000+00:00 +2024-02-09T20:23:01.477000+00:00 ``` ### Last Data Feed Release @@ -29,48 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238062 +238065 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `3` -* [CVE-2023-50291](CVE-2023/CVE-2023-502xx/CVE-2023-50291.json) (`2024-02-09T18:15:08.240`) -* [CVE-2023-50292](CVE-2023/CVE-2023-502xx/CVE-2023-50292.json) (`2024-02-09T18:15:08.363`) -* [CVE-2023-50298](CVE-2023/CVE-2023-502xx/CVE-2023-50298.json) (`2024-02-09T18:15:08.457`) -* [CVE-2023-50386](CVE-2023/CVE-2023-503xx/CVE-2023-50386.json) (`2024-02-09T18:15:08.540`) +* [CVE-2024-1245](CVE-2024/CVE-2024-12xx/CVE-2024-1245.json) (`2024-02-09T20:15:54.370`) +* [CVE-2024-1246](CVE-2024/CVE-2024-12xx/CVE-2024-1246.json) (`2024-02-09T20:15:54.573`) +* [CVE-2024-1247](CVE-2024/CVE-2024-12xx/CVE-2024-1247.json) (`2024-02-09T19:15:24.183`) ### CVEs modified in the last Commit -Recently modified CVEs: `32` - -* [CVE-2024-0833](CVE-2024/CVE-2024-08xx/CVE-2024-0833.json) (`2024-02-09T17:05:04.153`) -* [CVE-2024-0832](CVE-2024/CVE-2024-08xx/CVE-2024-0832.json) (`2024-02-09T17:12:45.853`) -* [CVE-2024-0219](CVE-2024/CVE-2024-02xx/CVE-2024-0219.json) (`2024-02-09T17:15:31.870`) -* [CVE-2024-20825](CVE-2024/CVE-2024-208xx/CVE-2024-20825.json) (`2024-02-09T17:29:39.753`) -* [CVE-2024-20823](CVE-2024/CVE-2024-208xx/CVE-2024-20823.json) (`2024-02-09T17:30:06.773`) -* [CVE-2024-20822](CVE-2024/CVE-2024-208xx/CVE-2024-20822.json) (`2024-02-09T17:30:17.653`) -* [CVE-2024-0370](CVE-2024/CVE-2024-03xx/CVE-2024-0370.json) (`2024-02-09T17:30:35.817`) -* [CVE-2024-20824](CVE-2024/CVE-2024-208xx/CVE-2024-20824.json) (`2024-02-09T17:31:03.593`) -* [CVE-2024-23319](CVE-2024/CVE-2024-233xx/CVE-2024-23319.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-24774](CVE-2024/CVE-2024-247xx/CVE-2024-24774.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-24776](CVE-2024/CVE-2024-247xx/CVE-2024-24776.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25442](CVE-2024/CVE-2024-254xx/CVE-2024-25442.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25443](CVE-2024/CVE-2024-254xx/CVE-2024-25443.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25445](CVE-2024/CVE-2024-254xx/CVE-2024-25445.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25446](CVE-2024/CVE-2024-254xx/CVE-2024-25446.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25447](CVE-2024/CVE-2024-254xx/CVE-2024-25447.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25448](CVE-2024/CVE-2024-254xx/CVE-2024-25448.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25450](CVE-2024/CVE-2024-254xx/CVE-2024-25450.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25451](CVE-2024/CVE-2024-254xx/CVE-2024-25451.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25452](CVE-2024/CVE-2024-254xx/CVE-2024-25452.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25453](CVE-2024/CVE-2024-254xx/CVE-2024-25453.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-25454](CVE-2024/CVE-2024-254xx/CVE-2024-25454.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-1402](CVE-2024/CVE-2024-14xx/CVE-2024-1402.json) (`2024-02-09T17:31:15.470`) -* [CVE-2024-22851](CVE-2024/CVE-2024-228xx/CVE-2024-22851.json) (`2024-02-09T18:03:33.997`) -* [CVE-2024-22318](CVE-2024/CVE-2024-223xx/CVE-2024-22318.json) (`2024-02-09T18:15:08.680`) +Recently modified CVEs: `172` + +* [CVE-2024-24756](CVE-2024/CVE-2024-247xx/CVE-2024-24756.json) (`2024-02-09T19:47:10.213`) +* [CVE-2024-24755](CVE-2024/CVE-2024-247xx/CVE-2024-24755.json) (`2024-02-09T19:47:59.967`) +* [CVE-2024-0325](CVE-2024/CVE-2024-03xx/CVE-2024-0325.json) (`2024-02-09T19:48:49.967`) +* [CVE-2024-0269](CVE-2024/CVE-2024-02xx/CVE-2024-0269.json) (`2024-02-09T19:56:14.050`) +* [CVE-2024-24569](CVE-2024/CVE-2024-245xx/CVE-2024-24569.json) (`2024-02-09T20:15:06.707`) +* [CVE-2024-1113](CVE-2024/CVE-2024-11xx/CVE-2024-1113.json) (`2024-02-09T20:15:53.813`) +* [CVE-2024-1114](CVE-2024/CVE-2024-11xx/CVE-2024-1114.json) (`2024-02-09T20:15:53.917`) +* [CVE-2024-1116](CVE-2024/CVE-2024-11xx/CVE-2024-1116.json) (`2024-02-09T20:15:54.017`) +* [CVE-2024-1117](CVE-2024/CVE-2024-11xx/CVE-2024-1117.json) (`2024-02-09T20:15:54.117`) +* [CVE-2024-1198](CVE-2024/CVE-2024-11xx/CVE-2024-1198.json) (`2024-02-09T20:15:54.207`) +* [CVE-2024-1225](CVE-2024/CVE-2024-12xx/CVE-2024-1225.json) (`2024-02-09T20:15:54.290`) +* [CVE-2024-1258](CVE-2024/CVE-2024-12xx/CVE-2024-1258.json) (`2024-02-09T20:15:54.857`) +* [CVE-2024-1259](CVE-2024/CVE-2024-12xx/CVE-2024-1259.json) (`2024-02-09T20:15:54.943`) +* [CVE-2024-1260](CVE-2024/CVE-2024-12xx/CVE-2024-1260.json) (`2024-02-09T20:15:55.030`) +* [CVE-2024-1261](CVE-2024/CVE-2024-12xx/CVE-2024-1261.json) (`2024-02-09T20:15:55.113`) +* [CVE-2024-1262](CVE-2024/CVE-2024-12xx/CVE-2024-1262.json) (`2024-02-09T20:15:55.190`) +* [CVE-2024-1263](CVE-2024/CVE-2024-12xx/CVE-2024-1263.json) (`2024-02-09T20:15:55.277`) +* [CVE-2024-1264](CVE-2024/CVE-2024-12xx/CVE-2024-1264.json) (`2024-02-09T20:15:55.367`) +* [CVE-2024-1167](CVE-2024/CVE-2024-11xx/CVE-2024-1167.json) (`2024-02-09T20:20:51.900`) +* [CVE-2024-24570](CVE-2024/CVE-2024-245xx/CVE-2024-24570.json) (`2024-02-09T20:21:06.250`) +* [CVE-2024-24561](CVE-2024/CVE-2024-245xx/CVE-2024-24561.json) (`2024-02-09T20:21:23.980`) +* [CVE-2024-24557](CVE-2024/CVE-2024-245xx/CVE-2024-24557.json) (`2024-02-09T20:21:32.970`) +* [CVE-2024-23832](CVE-2024/CVE-2024-238xx/CVE-2024-23832.json) (`2024-02-09T20:21:45.317`) +* [CVE-2024-1141](CVE-2024/CVE-2024-11xx/CVE-2024-1141.json) (`2024-02-09T20:22:03.893`) +* [CVE-2024-0935](CVE-2024/CVE-2024-09xx/CVE-2024-0935.json) (`2024-02-09T20:22:43.297`) ## Download and Usage