Skip to content

Commit

Permalink
Auto-Update: 2024-11-22T23:11:09.202836+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Nov 22, 2024
1 parent 9f94faf commit 6acca2f
Show file tree
Hide file tree
Showing 6,001 changed files with 209,222 additions and 42,840 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
23 changes: 18 additions & 5 deletions CVE-2014/CVE-2014-38xx/CVE-2014-3870.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@
"id": "CVE-2014-3870",
"sourceIdentifier": "[email protected]",
"published": "2014-05-27T13:55:06.410",
"lastModified": "2014-05-28T14:02:00.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T02:09:01.697",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
Expand Down Expand Up @@ -85,6 +84,20 @@
"tags": [
"Exploit"
]
},
{
"url": "http://packetstormsecurity.com/files/126782/wpbib2html-xss.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/67589",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}
42 changes: 37 additions & 5 deletions CVE-2014/CVE-2014-38xx/CVE-2014-3871.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@
"id": "CVE-2014-3871",
"sourceIdentifier": "[email protected]",
"published": "2014-05-27T13:55:07.037",
"lastModified": "2015-09-29T18:48:10.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T02:09:01.853",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
Expand Down Expand Up @@ -104,6 +103,39 @@
"tags": [
"Exploit"
]
},
{
"url": "http://geodesicsolutions.com/changelog/7.3/changelog.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/show/osvdb/106364",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.com/files/126329/GeoCore-MAX-DB-7.3.3-Blind-SQL-Injection.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://secunia.com/advisories/58308",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.exploit-db.com/exploits/33075",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.securityfocus.com/bid/67078",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}
25 changes: 20 additions & 5 deletions CVE-2014/CVE-2014-38xx/CVE-2014-3872.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@
"id": "CVE-2014-3872",
"sourceIdentifier": "[email protected]",
"published": "2014-05-27T13:55:07.207",
"lastModified": "2023-04-26T19:27:52.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T02:09:02.000",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
Expand Down Expand Up @@ -105,6 +104,22 @@
{
"url": "http://www.securityfocus.com/bid/67310",
"source": "[email protected]"
},
{
"url": "http://secunia.com/advisories/58254",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10023",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67310",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
29 changes: 24 additions & 5 deletions CVE-2014/CVE-2014-38xx/CVE-2014-3873.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@
"id": "CVE-2014-3873",
"sourceIdentifier": "[email protected]",
"published": "2014-06-10T14:55:10.287",
"lastModified": "2014-06-24T14:41:48.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T02:09:02.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
Expand Down Expand Up @@ -106,6 +105,26 @@
{
"url": "http://www.securitytracker.com/id/1030325",
"source": "[email protected]"
},
{
"url": "http://secunia.com/advisories/58627",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A12.ktrace.asc",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/67812",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id/1030325",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}
30 changes: 25 additions & 5 deletions CVE-2014/CVE-2014-38xx/CVE-2014-3876.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@
"id": "CVE-2014-3876",
"sourceIdentifier": "[email protected]",
"published": "2014-06-18T14:55:12.897",
"lastModified": "2014-06-18T18:24:11.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-21T02:09:02.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -23,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
Expand Down Expand Up @@ -93,6 +92,27 @@
"tags": [
"Exploit"
]
},
{
"url": "http://fex.rus.uni-stuttgart.de/fex.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.lsexperts.de/advisories/lse-2014-05-22.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}
34 changes: 27 additions & 7 deletions CVE-2014/CVE-2014-38xx/CVE-2014-3877.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,8 @@
"id": "CVE-2014-3877",
"sourceIdentifier": "[email protected]",
"published": "2014-06-18T14:55:12.960",
"lastModified": "2014-06-18T18:27:01.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\n\n\"CWE-184: Incomplete Blacklist\"",
"lastModified": "2024-11-21T02:09:02.580",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand All @@ -24,13 +22,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
Expand Down Expand Up @@ -94,6 +92,28 @@
"tags": [
"Exploit"
]
},
{
"url": "http://fex.rus.uni-stuttgart.de/fex.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://packetstormsecurity.com/files/126906/F-EX-20140313-1-HTTP-Response-Splitting-Cross-Site-Scripting.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.lsexperts.de/advisories/lse-2014-05-22.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\n\n\"CWE-184: Incomplete Blacklist\""
}
Loading

0 comments on commit 6acca2f

Please sign in to comment.