Skip to content

Commit

Permalink
Update CVE and NVD data
Browse files Browse the repository at this point in the history
  • Loading branch information
GSD-automation committed Apr 24, 2024
1 parent 74a6e92 commit 0fe7cbb
Show file tree
Hide file tree
Showing 713 changed files with 33,265 additions and 2,518 deletions.
11 changes: 10 additions & 1 deletion 2002/20xxx/GSD-2002-20001.json
Original file line number Diff line number Diff line change
Expand Up @@ -138,6 +138,11 @@
"name": "https://dheatattack.gitlab.io/",
"refsource": "MISC",
"url": "https://dheatattack.gitlab.io/"
},
{
"name": "https://ieeexplore.ieee.org/document/10374117",
"refsource": "MISC",
"url": "https://ieeexplore.ieee.org/document/10374117"
}
]
}
Expand Down Expand Up @@ -586,7 +591,7 @@
}
],
"id": "CVE-2002-20001",
"lastModified": "2024-01-11T03:15:08.380",
"lastModified": "2024-04-23T07:15:41.853",
"metrics": {
"cvssMetricV2": [
{
Expand Down Expand Up @@ -674,6 +679,10 @@
"source": "[email protected]",
"url": "https://gitlab.com/dheatattack/dheater"
},
{
"source": "[email protected]",
"url": "https://ieeexplore.ieee.org/document/10374117"
},
{
"source": "[email protected]",
"tags": [
Expand Down
54 changes: 27 additions & 27 deletions 2004/0xxx/GSD-2004-0285.json
Original file line number Diff line number Diff line change
Expand Up @@ -127,68 +127,68 @@
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:voice_of_web:allmyguests:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61D1A744-FD16-4F01-B73B-57CFA0FFC404",
"criteria": "cpe:2.3:a:allmyguests_project:allmyguests:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "150C15C9-E00B-4036-A7FC-86744751B596",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmyguests:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5CCFACDB-1219-444F-BDB0-F9D05A67295C",
"criteria": "cpe:2.3:a:allmyguests_project:allmyguests:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "019F3A73-9303-4334-A542-29BF131BA145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmyguests:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A9CD33-0E01-4DEC-B3E2-E625FB6DB6E5",
"criteria": "cpe:2.3:a:allmyguests_project:allmyguests:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "06392BCF-C5B2-42C8-8207-DB24C5AF51CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmyguests:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EEADB6F5-20D9-4294-8C97-ED43483EACDE",
"criteria": "cpe:2.3:a:allmyguests_project:allmyguests:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16E01D6D-FC5E-4357-8AEE-16C9379A2717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "90FC1575-1281-4A24-9BFF-C290280C1F95",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E889F41E-DE82-4CC6-B002-1397B2D9B4A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "19E65C3F-C409-4E35-87E1-302E68148183",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB00D9B-B151-4B5A-8340-62C66A8D1474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC765E1-6AB2-44FA-B959-76A60E1B1F2D",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD4E88E-916D-4D55-8325-2D717A0EBD12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDF3882-FABD-4B25-B548-37E24BBEA87C",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9795C144-FE57-4227-9F2D-7F019F63FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "045E4B19-83E1-4591-9BC5-5141573D6B20",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5B86F765-5F8C-4FBC-B8D9-5F466D00F855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1134DDFE-278B-4E76-BA96-4815022F31B4",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DE67189F-E90F-47FD-B457-A0D761FBDE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmylinks:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3975158B-E3B1-4FB4-B332-F651E1AD1F11",
"criteria": "cpe:2.3:a:allmylinks_project:allmylinks:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5B81E1-5579-44F8-B0F0-1E457EAA7A30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmyvisitors:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "25B6FF1C-0953-4F37-89ED-FECF44CA7BC5",
"criteria": "cpe:2.3:a:allmyvisitors_project:allmyvisitors:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAD2ADE-A8DA-47ED-957A-29E80ED15B14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:voice_of_web:allmyvisitors:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F21F3DE0-F59E-4090-AD70-60178F8B5037",
"criteria": "cpe:2.3:a:allmyvisitors_project:allmyvisitors:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A5EC815D-6510-4188-8D62-76385D6D5B4B",
"vulnerable": true
}
],
Expand All @@ -209,7 +209,7 @@
}
],
"id": "CVE-2004-0285",
"lastModified": "2024-02-08T02:26:13.527",
"lastModified": "2024-04-23T19:52:22.567",
"metrics": {
"cvssMetricV2": [
{
Expand Down
199 changes: 104 additions & 95 deletions 2006/4xxx/GSD-2006-4993.json
Original file line number Diff line number Diff line change
Expand Up @@ -105,110 +105,119 @@
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
"cve": {
"configurations": [
{
"children": [],
"cpe_match": [
"nodes": [
{
"cpe23Uri": "cpe:2.3:a:voice_of_web:allmyguests:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.4.1",
"vulnerable": true
"cpeMatch": [
{
"criteria": "cpe:2.3:a:allmyguests_project:allmyguests:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C340FD19-43D3-4CA4-A1AA-1E97492F3C45",
"versionEndIncluding": "0.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
]
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "[email protected]",
"ID": "CVE-2006-4993"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple PHP remote file inclusion vulnerabilities in AllMyGuests 0.4.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the _AMGconfig[cfg_serverpath] parameter in (1) modules/AllMyGuests/signin.php (aka the Nuke module) and (2) AllMyGuests/signin.php (aka the standalone)."
}
]
},
"problemtype": {
"problemtype_data": [
],
"descriptions": [
{
"lang": "en",
"value": "Multiple PHP remote file inclusion vulnerabilities in AllMyGuests 0.4.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the _AMGconfig[cfg_serverpath] parameter in (1) modules/AllMyGuests/signin.php (aka the Nuke module) and (2) AllMyGuests/signin.php (aka the standalone)."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades PHP de inclusi\u00f3n remota de archivo en AllMyGuests 0.4.1 y anteriores permiten a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro _AMGconfig[cfg_serverpath] en modules/AllMyGuests/signin.php (tambi\u00e9n conocido como el m\u00f3dulo Nuke) y (2) AllMyGuests/signin.php (tambi\u00e9n conocido como el aut\u00f3nomo)."
}
],
"id": "CVE-2006-4993",
"lastModified": "2024-04-23T19:52:10.963",
"metrics": {
"cvssMetricV2": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"references": {
"reference_data": [
{
"name": "22095",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/22095"
},
{
"name": "20303",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/20303"
},
{
"name": "ADV-2006-3863",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2006/3863"
},
{
"name": "allmyguests-signin-file-include(29064)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29064"
},
{
"name": "2405",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/2405"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
"published": "2006-09-26T02:07:00.000",
"references": [
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "http://secunia.com/advisories/22095"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-10-19T01:29Z",
"publishedDate": "2006-09-26T02:07Z"
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/20303"
},
{
"source": "[email protected]",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2006/3863"
},
{
"source": "[email protected]",
"tags": [
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29064"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/2405"
}
],
"sourceIdentifier": "[email protected]",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "[email protected]",
"type": "Primary"
}
]
}
}
}
}
Loading

0 comments on commit 0fe7cbb

Please sign in to comment.