Last active
March 10, 2018 23:26
-
-
Save xlfe/020397180126549f51fd728cca7961c2 to your computer and use it in GitHub Desktop.
CVE and CWEs to CSV files
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# coding: utf-8 | |
# #CVE and CWE formatting to TSV | |
# In[217]: | |
from jsonpath_ng import jsonpath, parse | |
import csv | |
import requests | |
import zipfile | |
import io | |
import json | |
import os | |
def get_data(uri): | |
fn = uri.split('/')[-1] | |
if os.path.exists(fn): | |
print('opening {}'.format(fn)) | |
else: | |
print('downloading {}'.format(fn)) | |
res = requests.get(uri) | |
with open(fn,'wb') as outf: | |
print('wrote {} bytes'.format(outf.write(res.content))) | |
z = zipfile.ZipFile(fn) | |
assert len(z.filelist) == 1 | |
data= z.open(z.filelist[0].orig_filename).read() | |
if z.filelist[0].orig_filename.endswith('.json'): | |
data= json.loads(data) | |
z.close() | |
return data | |
# In[223]: | |
data_uris = [ | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2018.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2017.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2016.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2015.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2014.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2013.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2012.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2011.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2010.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2009.json.zip', | |
'https://static.nvd.nist.gov/feeds/json/cve/1.0/nvdcve-1.0-2008.json.zip' | |
] | |
CVEs = [] | |
for uri in data_uris: | |
CVEs.extend(get_data(uri)['CVE_Items']) | |
# In[286]: | |
sevlist = [ | |
'accessVector', | |
'accessComplexity', | |
'authentication', | |
'confidentialityImpact', | |
'integrityImpact', | |
'availabilityImpact', | |
'baseScore' | |
] | |
sev_items = map(lambda _: [_,parse('impact.baseMetricV2.cvssV2.{}'.format(_))], sevlist) | |
columns = dict(sev_items, | |
cve_id = parse('cve.CVE_data_meta.ID'), | |
vendor = parse('cve.affects.vendor.vendor_data.[*].vendor_name'), | |
product = parse('cve.affects.vendor.vendor_data.[*].product.[*].product_data.[*].product_name'), | |
cwe = parse('cve.problemtype.problemtype_data.[*].description.[*].value'), | |
) | |
def gpv(data, path): | |
"""get values from a path""" | |
res = path.find(data) | |
values = list(set([_ for _ in map(lambda _:_.value, res)])) | |
if len(values) == 1: | |
return values[0] | |
else: | |
return ','.join(values) | |
def cve_extract_fields(items): | |
for item in items: | |
yield { | |
k:gpv(item, jp) for k, jp in columns.items() | |
} | |
# In[287]: | |
with open('CVEs.csv', 'w') as outf: | |
writer = csv.DictWriter(outf, fieldnames=columns.keys()) | |
writer.writeheader() | |
#Filter out CVEs that have not been assessed | |
for d in filter(lambda _: _['cwe'], cve_extract_fields(CVEs)): | |
writer.writerow(d) | |
# In[277]: | |
CWEs = [] | |
cwe = get_data('https://cwe.mitre.org/data/csv/1000.csv.zip') | |
for line in csv.DictReader(cwe.decode('utf-8').split('\n')): | |
CWEs.append(dict(line)) | |
print('{} CWEs read'.format(len(CWEs))) | |
# In[338]: | |
def parse_with_fm(cwe, field, filters, maps): | |
rws = cwe[field].split('::') | |
for f in [lambda _:_] + filters: | |
rws = filter(f, rws) | |
for m in maps: | |
rws = map(m, rws) | |
rws = filter(lambda _:_, rws) | |
return ', '.join(list(set(rws))) | |
def get_f12(f): | |
f = f.split(':') | |
if f[2].endswith('PREVALENCE'): | |
return f[0].split(' ')[0] +'-' +f[1] | |
return '-'.join(f[1:3]) | |
def get_modes(f): | |
m = f.split(':') | |
try: | |
return m[m.index('PHASE')+1] | |
except: | |
return '' | |
def get_consequences(f): | |
return f.split(':')[1] | |
cwe_fields = dict( | |
name=lambda cwe:cwe['Name'], | |
id=lambda cwe:cwe['ID'], | |
children= | |
lambda cwe: parse_with_fm(cwe, 'Related Weaknesses', filters=[ | |
lambda _:_.startswith('NATURE:ChildOf') | |
], maps=[ | |
lambda _:_.split(':')[3] | |
]), | |
platforms = lambda cwe: parse_with_fm(cwe, 'Applicable Platforms',filters=[],maps=[get_f12]), | |
modes=lambda cwe:parse_with_fm(cwe, 'Modes Of Introduction', filters=[],maps=[get_modes]), | |
consequence=lambda cwe:parse_with_fm(cwe, 'Common Consequences',filters=[], maps=[get_consequences]) | |
) | |
def cwe_extract_details(items): | |
for item in items: | |
yield { | |
k:fn(item) for k, fn in cwe_fields.items() | |
} | |
# In[339]: | |
with open('CWEs.csv', 'w') as outf: | |
writer = csv.DictWriter(outf, fieldnames=cwe_fields.keys()) | |
writer.writeheader() | |
for d in cwe_extract_details(CWEs): | |
writer.writerow(d) | |
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-0001", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0002", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-0003", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2018-0004", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-0005", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-754" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2018-0006", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-0007", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-0008", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0009", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-0010", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-0011", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-0012", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-0013", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2018-0014", | |
"vendor": "juniper", | |
"product": "screenos", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0086", | |
"vendor": "cisco", | |
"product": "unified_customer_voice_portal", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-0088", | |
"vendor": "cisco", | |
"product": "industrial_ethernet_4010_series_firmware", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0089", | |
"vendor": "cisco", | |
"product": "policy_suite", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0090", | |
"vendor": "cisco", | |
"product": "nx-os", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0091", | |
"vendor": "cisco", | |
"product": "identity_services_engine", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2018-0092", | |
"vendor": "cisco", | |
"product": "nx-os", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0093", | |
"vendor": "cisco", | |
"product": "web_security_appliance", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0094", | |
"vendor": "cisco", | |
"product": "unified_computing_system_central_software", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-0095", | |
"vendor": "cisco", | |
"product": "asyncos", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-0096", | |
"vendor": "cisco", | |
"product": "prime_infrastructure", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-0097", | |
"vendor": "cisco", | |
"product": "prime_infrastructure", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0098", | |
"vendor": "cisco", | |
"product": "wap150_firmware,wap361_firmware", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-0099", | |
"vendor": "cisco", | |
"product": "d9800_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2018-0100", | |
"vendor": "cisco", | |
"product": "anyconnect_secure_mobility_client", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-0101", | |
"vendor": "cisco", | |
"product": "firepower_threat_defense,adaptive_security_appliance_software", | |
"cwe": "CWE-415" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-0102", | |
"vendor": "cisco", | |
"product": "nx-os", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.6, | |
"cve_id": "CVE-2018-0103", | |
"vendor": "cisco", | |
"product": "webex_meetings,webex_business_suite,webex_network_recording_player,webex_meetings_server", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0104", | |
"vendor": "cisco", | |
"product": "webex_meetings,webex_business_suite,webex_network_recording_player,webex_meetings_server", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0105", | |
"vendor": "cisco", | |
"product": "unified_communications_manager", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-0106", | |
"vendor": "cisco", | |
"product": "elastic_services_controller", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-0107", | |
"vendor": "cisco", | |
"product": "prime_service_catalog", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0108", | |
"vendor": "cisco", | |
"product": "webex_meetings_server", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-0109", | |
"vendor": "cisco", | |
"product": "webex_meetings_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-0110", | |
"vendor": "cisco", | |
"product": "webex_meetings_server", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0111", | |
"vendor": "cisco", | |
"product": "webex_meetings_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-0113", | |
"vendor": "cisco", | |
"product": "unified_computing_system_central_software", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0114", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-320" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-0115", | |
"vendor": "cisco", | |
"product": "staros", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-0116", | |
"vendor": "cisco", | |
"product": "mobility_services_engine", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0118", | |
"vendor": "cisco", | |
"product": "unified_communications_manager", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-0120", | |
"vendor": "cisco", | |
"product": "unified_communications_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0128", | |
"vendor": "cisco", | |
"product": "data_center_analytics_framework", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0129", | |
"vendor": "cisco", | |
"product": "data_center_analytics_framework", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0134", | |
"vendor": "cisco", | |
"product": "mobility_services_engine", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-0136", | |
"vendor": "cisco", | |
"product": "ios_xr", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-0486", | |
"vendor": "debian", | |
"product": "debian_linux", | |
"cwe": "CWE-347" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-0506", | |
"vendor": "nootka_project", | |
"product": "nootka", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0507", | |
"vendor": "ntt-east", | |
"product": "flet's_virus_clear_v6_easy_setup_&_application_tool,flet's_virus_clear_easy_setup_&_application_tool", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0508", | |
"vendor": "kkcald_project", | |
"product": "kkcald", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-0509", | |
"vendor": "kkcald_project", | |
"product": "kkcald", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-0510", | |
"vendor": "kkcald_project", | |
"product": "kkcald", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0511", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.7, | |
"cve_id": "CVE-2018-0512", | |
"vendor": "iodata", | |
"product": "whg-ac1750a_firmware,wn-g300r3_firmware,hdl-xv_firmware,hdl-t_firmware,wnpr1167g_firmware,whg-napg_firmware,wn-g300ex_firmware,wn-ac583rk_firmware,hdl-gtr_firmware,whg-napga_firmware,hdl2-a_firmware,hdl-gt_firmware,wn-ac1600dgr_firmware,wn-ag750dgr_firmware,wn-ax1167gr_firmware,wn-ac583trk_firmware,hvl-s_firmware,wn-ag300dgr_firmware,hdl-ah_firmware,hdl-a_firmware,hdl-xr2u_firmware,hvl-a_firmware,gv-ntx2_firmware,hvl-at_firmware,hfas1_firmware,wn-ac1167dgr_firmware,bx-vp1_firmware,whg-ac1750_firmware,hdl-xr_firmware,hdl-xvw_firmware,wn-g300r_firmware,wn-gx300gr_firmware,hdl-xr2uw_firmware,hls-c_firmware,wnpr1167f_firmware,gv-ntx1_firmware,hdl-xrw_firmware,wn-ac1300ex_firmware,hdl2-ah_firmware,wnpr2600g_firmware,whg-napgal_firmware,wn-g300sr_firmware,whg-ac1750al_firmware,wnpr1750g_firmware,hvl-ata_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-0741", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-0743", | |
"vendor": "microsoft", | |
"product": "windows_10,windows_server_1709", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-0744", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_server_1709,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2018-0745", | |
"vendor": "microsoft", | |
"product": "windows_10,windows_server_1709", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2018-0746", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_server_1709,windows_8.1", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2018-0747", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_1709,windows_8.1,windows_server_2012,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-0748", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_1709,windows_8.1,windows_server_2012,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-0749", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_1709,windows_8.1,windows_server_2012,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-0750", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2018-0751", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_server_1709,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-0752", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_server_1709,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2018-0753", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_server_1709,windows_8.1", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-0754", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_1709,windows_8.1,windows_server_2012,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2018-0757", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0758", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0762", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-0763", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0764", | |
"vendor": "microsoft", | |
"product": ".net_framework,.net_core", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0766", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-0767", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0768", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0769", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0770", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0772", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0773", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0774", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0775", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0776", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0777", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0778", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-0780", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0781", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-0784", | |
"vendor": "microsoft", | |
"product": "asp.net_core", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0785", | |
"vendor": "microsoft", | |
"product": "asp.net_core", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-0786", | |
"vendor": "microsoft", | |
"product": ".net_framework,.net_core", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2018-0788", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_server_2012,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-0789", | |
"vendor": "microsoft", | |
"product": "sharepoint_server,sharepoint_enterprise_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-0790", | |
"vendor": "microsoft", | |
"product": "sharepoint_foundation,sharepoint_enterprise_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0791", | |
"vendor": "microsoft", | |
"product": "office,outlook", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0792", | |
"vendor": "microsoft", | |
"product": "office_online_server,sharepoint_server,word,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0793", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0794", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0795", | |
"vendor": "microsoft", | |
"product": "word,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0796", | |
"vendor": "microsoft", | |
"product": "office,office_compatibility_pack,excel,excel_viewer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0797", | |
"vendor": "microsoft", | |
"product": "word,sharepoint_enterprise_server,word_viewer,office_compatibility_pack,office,office_web_apps_server,office_online_server,sharepoint_server,office_web_apps", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0798", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0799", | |
"vendor": "microsoft", | |
"product": "sharepoint_enterprise_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0800", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0801", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0802", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-0803", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0804", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0805", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0806", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0807", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2018-0810", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_server_2012", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0812", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.5, | |
"cve_id": "CVE-2018-0818", | |
"vendor": "microsoft", | |
"product": "chakracore", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0819", | |
"vendor": "microsoft", | |
"product": "office", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2018-0829", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_1709,windows_8.1,windows_server_2012,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0835", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0836", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0837", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0838", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-0839", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-0844", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_1709,windows_8.1,windows_server_2012,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0845", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0848", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0849", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0851", | |
"vendor": "microsoft", | |
"product": "office_word_viewer,office,outlook", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0852", | |
"vendor": "microsoft", | |
"product": "office,outlook", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0856", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0857", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0859", | |
"vendor": "microsoft", | |
"product": "chakracore,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-0860", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-0862", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-0869", | |
"vendor": "microsoft", | |
"product": "sharepoint_enterprise_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-1000001", | |
"vendor": "gnu", | |
"product": "glibc", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1000002", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1000003", | |
"vendor": "powerdns", | |
"product": "recursor", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2018-1000004", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-362" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-1000005", | |
"vendor": "debian,haxx", | |
"product": "libcurl,debian_linux", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-1000006", | |
"vendor": "atom", | |
"product": "electron", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1000007", | |
"vendor": "debian,haxx", | |
"product": "debian_linux,curl", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000008", | |
"vendor": "jenkins", | |
"product": "pmd", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000009", | |
"vendor": "jenkins", | |
"product": "checkstyle", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000010", | |
"vendor": "jenkins", | |
"product": "dry", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000011", | |
"vendor": "jenkins", | |
"product": "findbugs", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000012", | |
"vendor": "jenkins", | |
"product": "warnings", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000013", | |
"vendor": "jenkins", | |
"product": "release", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000014", | |
"vendor": "jenkins", | |
"product": "translation_assistance", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-1000015", | |
"vendor": "jenkins", | |
"product": "pipeline_nodes_and_processes", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-1000018", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-255,CWE-532" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-1000019", | |
"vendor": "open-emr", | |
"product": "openemr", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1000020", | |
"vendor": "open-emr", | |
"product": "openemr", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000021", | |
"vendor": "git-scm", | |
"product": "git", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-1000022", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-285" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1000023", | |
"vendor": "insight.bitpay", | |
"product": "insight-api", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1000024", | |
"vendor": "squid-cache,debian", | |
"product": "debian_linux,squid", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000025", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000026", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1000027", | |
"vendor": "squid-cache,debian", | |
"product": "debian_linux,squid", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-1000028", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1000029", | |
"vendor": "elsa_project", | |
"product": "elsa", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000031", | |
"vendor": "info-zip", | |
"product": "unzip", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000032", | |
"vendor": "info-zip", | |
"product": "unzip", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-1000033", | |
"vendor": "info-zip", | |
"product": "unzip", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-1000034", | |
"vendor": "info-zip", | |
"product": "unzip", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000035", | |
"vendor": "info-zip", | |
"product": "unzip", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1000041", | |
"vendor": "debian,gnome", | |
"product": "debian_linux,librsvg", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-1000042", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-1000043", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-1000044", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000045", | |
"vendor": "nasa", | |
"product": "singledop", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000046", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000047", | |
"vendor": "nasa", | |
"product": "kodiak", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000048", | |
"vendor": "nasa", | |
"product": "rtretrievalframework", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-1000049", | |
"vendor": "nanopool", | |
"product": "claymore_dual_miner", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000050", | |
"vendor": "stb_vorbis_project", | |
"product": "stb_vorbis", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000051", | |
"vendor": "artifex", | |
"product": "mupdf", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1000052", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1000053", | |
"vendor": "limesurvey", | |
"product": "limesurvey", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000054", | |
"vendor": "jenkins", | |
"product": "ccm", | |
"cwe": "CWE-611,CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000055", | |
"vendor": "jenkins", | |
"product": "android_lint", | |
"cwe": "CWE-611,CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000056", | |
"vendor": "jenkins", | |
"product": "junit", | |
"cwe": "CWE-611,CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-1000057", | |
"vendor": "jenkins", | |
"product": "credentials_binding", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1000058", | |
"vendor": "jenkins", | |
"product": "pipeline_supporting_apis", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-1000059", | |
"vendor": "validformbuilder", | |
"product": "validform_builder", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1000060", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-1000061", | |
"vendor": "arm", | |
"product": "mbed_tls", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-1000062", | |
"vendor": "wondercms", | |
"product": "wondercms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-1042", | |
"vendor": "moodle", | |
"product": "moodle", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-1043", | |
"vendor": "moodle", | |
"product": "moodle", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-1044", | |
"vendor": "moodle", | |
"product": "moodle", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-1045", | |
"vendor": "moodle", | |
"product": "moodle", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-1047", | |
"vendor": "redhat", | |
"product": "jboss_wildfly_application_server", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1048", | |
"vendor": "redhat", | |
"product": "jboss_enterprise_application_platform", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1051", | |
"vendor": "redhat", | |
"product": "resteasy", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-1161", | |
"vendor": "quest", | |
"product": "netvault_backup", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.5, | |
"cve_id": "CVE-2018-1162", | |
"vendor": "quest", | |
"product": "netvault_backup", | |
"cwe": "CWE-285" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-1163", | |
"vendor": "quest", | |
"product": "netvault_backup", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1190", | |
"vendor": "pivotal", | |
"product": "cf-release,uaa_bosh", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1192", | |
"vendor": "pivotal_software", | |
"product": "cloud_foundry_uaa-release", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1307", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-1342", | |
"vendor": "netiq", | |
"product": "access_manager", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1361", | |
"vendor": "ibm", | |
"product": "websphere_portal", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-1362", | |
"vendor": "ibm", | |
"product": "curam_social_program_management", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-1364", | |
"vendor": "ibm", | |
"product": "content_navigator", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-1366", | |
"vendor": "ibm", | |
"product": "content_navigator", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2018-1368", | |
"vendor": "ibm", | |
"product": "security_guardium_database_activity_monitor", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-1382", | |
"vendor": "ibm", | |
"product": "api_connect", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-1388", | |
"vendor": "ibm", | |
"product": "websphere_mq", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-1401", | |
"vendor": "ibm", | |
"product": "websphere_portal", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-1411", | |
"vendor": "ibm", | |
"product": "notes,client_application_access", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-1414", | |
"vendor": "ibm", | |
"product": "maximo_asset_management,maximo_asset_management_essentials", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-1415", | |
"vendor": "ibm", | |
"product": "maximo_asset_management", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2360", | |
"vendor": "sap", | |
"product": "sap_kernel", | |
"cwe": "CWE-306" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2361", | |
"vendor": "sap", | |
"product": "solution_manager", | |
"cwe": "CWE-285" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2362", | |
"vendor": "sap", | |
"product": "hana", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2363", | |
"vendor": "sap", | |
"product": "business_application_software_integrated_solution,netweaver", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2364", | |
"vendor": "sap", | |
"product": "customer_relationship_management_webclient_ui,s4fnd", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2374", | |
"vendor": "sap", | |
"product": "hana_extend_application_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2375", | |
"vendor": "sap", | |
"product": "hana_extend_application_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2376", | |
"vendor": "sap", | |
"product": "hana_extend_application_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2377", | |
"vendor": "sap", | |
"product": "hana_extend_application_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2378", | |
"vendor": "sap", | |
"product": "hana_extend_application_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2379", | |
"vendor": "sap", | |
"product": "hana_extend_application_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2382", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2383", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2384", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2385", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-369" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2386", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2387", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2388", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2389", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2390", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2391", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2392", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2393", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2394", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2395", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2396", | |
"vendor": "sap", | |
"product": "internet_graphics_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.2, | |
"cve_id": "CVE-2018-2560", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2561", | |
"vendor": "oracle", | |
"product": "http_server", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2562", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2564", | |
"vendor": "oracle", | |
"product": "webcenter_content", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2565", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2566", | |
"vendor": "oracle", | |
"product": "integrated_lights_out_manager_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2567", | |
"vendor": "oracle", | |
"product": "communications_order_and_service_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2568", | |
"vendor": "oracle", | |
"product": "integrated_lights_out_manager_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2569", | |
"vendor": "oracle", | |
"product": "java_me", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2570", | |
"vendor": "oracle", | |
"product": "communications_unified_inventory_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2571", | |
"vendor": "oracle", | |
"product": "communications_unified_inventory_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2573", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2574", | |
"vendor": "oracle", | |
"product": "siebel_customer_relationship_management_desktop", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-2575", | |
"vendor": "oracle", | |
"product": "database_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2576", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-2577", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.2, | |
"cve_id": "CVE-2018-2578", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2579", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-2580", | |
"vendor": "oracle", | |
"product": "applications_dba", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2581", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2582", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2583", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2584", | |
"vendor": "oracle", | |
"product": "webcenter_sites", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-2585", | |
"vendor": "oracle", | |
"product": "mysql_connector/net", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2586", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2588", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2589", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2590", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2591", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2592", | |
"vendor": "oracle", | |
"product": "financial_services_balance_sheet_planning", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2593", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-2594", | |
"vendor": "oracle", | |
"product": "hyperion_bi+", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-2595", | |
"vendor": "oracle", | |
"product": "hyperion_bi+", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2596", | |
"vendor": "oracle", | |
"product": "webcenter_content", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2597", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_dining_room_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2599", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2600", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-2601", | |
"vendor": "oracle", | |
"product": "internet_directory", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.7, | |
"cve_id": "CVE-2018-2602", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2603", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2604", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2605", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-2606", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2607", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2608", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2609", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2610", | |
"vendor": "oracle", | |
"product": "hyperion_data_relationship_management", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2611", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2612", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-2613", | |
"vendor": "oracle", | |
"product": "argus_safety", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-2614", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2615", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2616", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2617", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2618", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2619", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2620", | |
"vendor": "oracle", | |
"product": "primavera_unifier", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-2621", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_shipboard_property_management_system", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2622", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2623", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2624", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2625", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2626", | |
"vendor": "oracle", | |
"product": "financial_services_balance_sheet_planning", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.7, | |
"cve_id": "CVE-2018-2627", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-2629", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2630", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2631", | |
"vendor": "oracle", | |
"product": "transportation_management", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2632", | |
"vendor": "oracle", | |
"product": "siebel_engineering-installer_and_deployment", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2018-2633", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2634", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2635", | |
"vendor": "oracle", | |
"product": "e-business_suite", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2636", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2637", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2018-2638", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2639", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2640", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-2641", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-2642", | |
"vendor": "oracle", | |
"product": "argus_safety", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2643", | |
"vendor": "oracle", | |
"product": "argus_safety", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2644", | |
"vendor": "oracle", | |
"product": "argus_safety", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2645", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2646", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2647", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2648", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-2649", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2650", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2651", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2652", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2653", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2654", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_human_capital_management_human_resources", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-2655", | |
"vendor": "oracle", | |
"product": "work_in_process", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-2656", | |
"vendor": "oracle", | |
"product": "e-business_suite", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2657", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2658", | |
"vendor": "oracle", | |
"product": "jd_edwards_enterpriseone_tools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2659", | |
"vendor": "oracle", | |
"product": "jd_edwards_enterpriseone_tools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2660", | |
"vendor": "oracle", | |
"product": "financial_services_analytical_applications_infrastructure", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2661", | |
"vendor": "oracle", | |
"product": "financial_services_analytical_applications_infrastructure", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2662", | |
"vendor": "oracle", | |
"product": "transportation_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2663", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2664", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2665", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2666", | |
"vendor": "oracle", | |
"product": "hospitality_labor_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2667", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2668", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2669", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2670", | |
"vendor": "oracle", | |
"product": "financial_services_profitability_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2671", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_purchasing", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2672", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2673", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2674", | |
"vendor": "oracle", | |
"product": "flexcube_direct_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2675", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2676", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2677", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-2678", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2679", | |
"vendor": "oracle", | |
"product": "financial_services_profitability_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2018-2680", | |
"vendor": "oracle", | |
"product": "database_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-2681", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_human_capital_management_human_resources", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2682", | |
"vendor": "oracle", | |
"product": "financial_services_liquidity_risk_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2683", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2684", | |
"vendor": "oracle", | |
"product": "e-business_suite", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2685", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2686", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2687", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2688", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2689", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2018-2690", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2691", | |
"vendor": "oracle", | |
"product": "user_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2692", | |
"vendor": "oracle", | |
"product": "financial_services_asset_liability_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.1, | |
"cve_id": "CVE-2018-2693", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.1, | |
"cve_id": "CVE-2018-2694", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2695", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-2696", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-2697", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.1, | |
"cve_id": "CVE-2018-2698", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2699", | |
"vendor": "oracle", | |
"product": "application_express", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-2700", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-2701", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2702", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_strategic_sourcing", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-2703", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2704", | |
"vendor": "oracle", | |
"product": "banking_payments", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2705", | |
"vendor": "oracle", | |
"product": "banking_payments", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-2706", | |
"vendor": "oracle", | |
"product": "banking_corporate_lending", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-2707", | |
"vendor": "oracle", | |
"product": "banking_corporate_lending", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-2708", | |
"vendor": "oracle", | |
"product": "banking_payments", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-2709", | |
"vendor": "oracle", | |
"product": "banking_corporate_lending", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-2710", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2711", | |
"vendor": "oracle", | |
"product": "jdeveloper", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2712", | |
"vendor": "oracle", | |
"product": "financial_services_loan_loss_forecasting_and_provisioning", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2713", | |
"vendor": "oracle", | |
"product": "webcenter_portal", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2714", | |
"vendor": "oracle", | |
"product": "financial_services_market_risk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-2715", | |
"vendor": "oracle", | |
"product": "business_intelligence", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2716", | |
"vendor": "oracle", | |
"product": "financial_services_market_risk_measurement_and_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2018-2717", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2719", | |
"vendor": "oracle", | |
"product": "financial_services_hedge_management_and_ifrs_valuations", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2720", | |
"vendor": "oracle", | |
"product": "financial_services_liquidity_risk_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2721", | |
"vendor": "oracle", | |
"product": "financial_services_price_creation_and_discovery", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2722", | |
"vendor": "oracle", | |
"product": "financial_services_price_creation_and_discovery", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2723", | |
"vendor": "oracle", | |
"product": "financial_services_asset_liability_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2724", | |
"vendor": "oracle", | |
"product": "financial_services_loan_loss_forecasting_and_provisioning", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2725", | |
"vendor": "oracle", | |
"product": "financial_services_hedge_management_and_ifrs_valuations", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2726", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2727", | |
"vendor": "oracle", | |
"product": "financial_services_market_risk_measurement_and_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2728", | |
"vendor": "oracle", | |
"product": "financial_services_funds_transfer_pricing", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2729", | |
"vendor": "oracle", | |
"product": "financial_services_funds_transfer_pricing", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2730", | |
"vendor": "oracle", | |
"product": "retail_merchandising_system", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-2731", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_eprocurement", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-2732", | |
"vendor": "oracle", | |
"product": "financial_services_analytical_applications_reconciliation_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-2733", | |
"vendor": "oracle", | |
"product": "hyperion_planning", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-3600", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-3601", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3602", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3603", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3604", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3605", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3606", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3607", | |
"vendor": "trendmicro", | |
"product": "control_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2018-3610", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-3810", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-3811", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-3813", | |
"vendor": "flir", | |
"product": "brickstream_2300_2d_firmware,brickstream_2300_3d_firmware,brickstream_2300_3d+_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-3814", | |
"vendor": "craftcms", | |
"product": "craft_cms", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-3815", | |
"vendor": "stalker", | |
"product": "communigate_pro", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-3835", | |
"vendor": "disneyanimation", | |
"product": "ptex", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-4834", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-4835", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-4836", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-4837", | |
"vendor": "", | |
"product": "", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-4862", | |
"vendor": "octopus", | |
"product": "octopus_deploy", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-4868", | |
"vendor": "exiv2", | |
"product": "exiv2", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-4871", | |
"vendor": "redhat,adobe", | |
"product": "enterprise_linux_desktop,flash_player,enterprise_linux_workstation,enterprise_linux_server", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-4877", | |
"vendor": "redhat,adobe", | |
"product": "enterprise_linux_desktop,flash_player,enterprise_linux_workstation,enterprise_linux_server", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-4878", | |
"vendor": "redhat,adobe", | |
"product": "enterprise_linux_desktop,flash_player,enterprise_linux_workstation,enterprise_linux_server", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5071", | |
"vendor": "cobham", | |
"product": "sea_tel_116_firmware", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5072", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-5073", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5074", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5075", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5076", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5077", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5078", | |
"vendor": "advanced_real_estate_script_project", | |
"product": "advanced_real_estate_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5079", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5080", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5081", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5082", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5083", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5084", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5085", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5086", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5087", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5088", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-5189", | |
"vendor": "jungo", | |
"product": "windriver", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5195", | |
"vendor": "hancom", | |
"product": "thinkfree_office_neo", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5205", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-134" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5206", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5207", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-134" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5208", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-5210", | |
"vendor": "samsung", | |
"product": "samsung_mobile", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5211", | |
"vendor": "phpsugar", | |
"product": "php_melody", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5212", | |
"vendor": "simple_download_monitor_project", | |
"product": "simple_download_monitor", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5213", | |
"vendor": "simple_download_monitor_project", | |
"product": "simple_download_monitor", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5214", | |
"vendor": "add_link_to_facebook_project", | |
"product": "add_link_to_facebook", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5215", | |
"vendor": "fork-cms", | |
"product": "fork_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5216", | |
"vendor": "radiantcms", | |
"product": "radiant_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5217", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5218", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5219", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5220", | |
"vendor": "k7computing", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5221", | |
"vendor": "barcodewiz", | |
"product": "barcode_activex_control", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-5244", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5246", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5247", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5248", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5249", | |
"vendor": "shaarli_project", | |
"product": "shaarli", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5251", | |
"vendor": "libming", | |
"product": "libming", | |
"cwe": "CWE-189" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-5252", | |
"vendor": "imageworsener_project", | |
"product": "imageworsener", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5253", | |
"vendor": "axiosys", | |
"product": "bento4", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5258", | |
"vendor": "banconeon", | |
"product": "neon", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5259", | |
"vendor": "discuz", | |
"product": "discuzx", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5261", | |
"vendor": "flexense", | |
"product": "diskboss", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5262", | |
"vendor": "flexense", | |
"product": "diskboss", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5263", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5266", | |
"vendor": "cobham", | |
"product": "sea_tel_121_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5267", | |
"vendor": "cobham", | |
"product": "sea_tel_121_firmware", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5268", | |
"vendor": "opencv", | |
"product": "opencv", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5269", | |
"vendor": "opencv", | |
"product": "opencv", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5270", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5271", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5272", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5273", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5274", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5275", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5276", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5277", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5278", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5279", | |
"vendor": "malwarebytes", | |
"product": "malwarebytes", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5280", | |
"vendor": "dell", | |
"product": "sonicwall_sonicos", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5281", | |
"vendor": "dell", | |
"product": "sonicwall_sonicos", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-5282", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5283", | |
"vendor": "photos_in_wifi_project", | |
"product": "photos_in_wifi", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5284", | |
"vendor": "wpscoop", | |
"product": "imageinject", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5285", | |
"vendor": "wpscoop", | |
"product": "imageinject", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5286", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5287", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5288", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5289", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5290", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5291", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5292", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5293", | |
"vendor": "gd_rating_system_project", | |
"product": "gd_rating_system", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5294", | |
"vendor": "libming", | |
"product": "libming", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5295", | |
"vendor": "podofo_project", | |
"product": "podofo", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5296", | |
"vendor": "podofo_project", | |
"product": "podofo", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5298", | |
"vendor": "pg", | |
"product": "oral-b_app", | |
"cwe": "CWE-326" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5299", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-5301", | |
"vendor": "magento", | |
"product": "magento", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5306", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5307", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5308", | |
"vendor": "podofo_project", | |
"product": "podofo", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5309", | |
"vendor": "podofo_project", | |
"product": "podofo", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-5310", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5311", | |
"vendor": "tonjoostudio", | |
"product": "easy_custom_auto_excerpt", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5312", | |
"vendor": "wpshopmart", | |
"product": "tabs_responsive", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5315", | |
"vendor": "wp_events_calendar_project", | |
"product": "wp_events_calendar", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5316", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5319", | |
"vendor": "ravpower", | |
"product": "filehub_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5326", | |
"vendor": "cmcm", | |
"product": "cm_browser", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5327", | |
"vendor": "cmcm", | |
"product": "armorfly_browser_&_downloader", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5328", | |
"vendor": "beims", | |
"product": "contractorweb.net", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5329", | |
"vendor": "beims", | |
"product": "contractorweb.net", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-5330", | |
"vendor": "zyxel", | |
"product": "p-660hw_v3_firmware", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5331", | |
"vendor": "discuz", | |
"product": "discuzx", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-5332", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-5333", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5334", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5335", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5336", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-5344", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5345", | |
"vendor": "gnome,fedoraproject", | |
"product": "fedora,gcab", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5347", | |
"vendor": "seagate", | |
"product": "personal_cloud_firmware", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5357", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5358", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-5359", | |
"vendor": "flexense", | |
"product": "sysgauge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5360", | |
"vendor": "libtiff,graphicsmagick", | |
"product": "libtiff,graphicsmagick", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5361", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5362", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5363", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5364", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5365", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5366", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5367", | |
"vendor": "wpglobus", | |
"product": "wpglobus", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5368", | |
"vendor": "srbtranslatin_project", | |
"product": "srbtranslatin", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5369", | |
"vendor": "srbtranslatin_project", | |
"product": "srbtranslatin", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5370", | |
"vendor": "bizlogicdev", | |
"product": "xnami", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-5371", | |
"vendor": "d-link", | |
"product": "dsl-2640u_firmware,dsl-2540u_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5372", | |
"vendor": "slidervilla", | |
"product": "testimonial_slider", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5373", | |
"vendor": "slidervilla", | |
"product": "smooth_slider", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5374", | |
"vendor": "slidervilla", | |
"product": "dbox_slider", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5375", | |
"vendor": "discuz", | |
"product": "discuzx", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5376", | |
"vendor": "discuz", | |
"product": "discuzx", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5377", | |
"vendor": "discuz", | |
"product": "discuzx", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-5441", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5442", | |
"vendor": "fujielectric", | |
"product": "v-server_vpr_firmware", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5443", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5445", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5447", | |
"vendor": "nrec", | |
"product": "pcs-9611_firmware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5479", | |
"vendor": "foxsash", | |
"product": "imghosting", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5550", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5650", | |
"vendor": "long_range_zip_project", | |
"product": "long_range_zip", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5651", | |
"vendor": "dark_mode_project", | |
"product": "dark_mode", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5652", | |
"vendor": "dark_mode_project", | |
"product": "dark_mode", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5653", | |
"vendor": "weblizar", | |
"product": "pinterest-feeds", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5654", | |
"vendor": "weblizar", | |
"product": "pinterest-feeds", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5655", | |
"vendor": "weblizar", | |
"product": "pinterest-feeds", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5656", | |
"vendor": "weblizar", | |
"product": "pinterest-feeds", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5657", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5658", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5659", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5660", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5661", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5662", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5663", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5664", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5665", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5666", | |
"vendor": "responsive_coming_soon_page_project", | |
"product": "responsive_coming_soon_page", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5667", | |
"vendor": "read_and_understood_project", | |
"product": "read_and_understood", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5668", | |
"vendor": "read_and_understood_project", | |
"product": "read_and_understood", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5669", | |
"vendor": "read_and_understood_project", | |
"product": "read_and_understood", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5670", | |
"vendor": "booking_calendar_project", | |
"product": "booking_calendar", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5671", | |
"vendor": "booking_calendar_project", | |
"product": "booking_calendar", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5672", | |
"vendor": "booking_calendar_project", | |
"product": "booking_calendar", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5673", | |
"vendor": "booking_calendar_project", | |
"product": "booking_calendar", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5681", | |
"vendor": "prestashop", | |
"product": "prestashop", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5682", | |
"vendor": "prestashop", | |
"product": "prestashop", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-5683", | |
"vendor": "qemu", | |
"product": "qemu", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5684", | |
"vendor": "libav", | |
"product": "libav", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5685", | |
"vendor": "graphicsmagick", | |
"product": "graphicsmagick", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5686", | |
"vendor": "artifex", | |
"product": "mupdf", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5687", | |
"vendor": "newsbee_project", | |
"product": "newsbee", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5688", | |
"vendor": "ilias", | |
"product": "ilias", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5689", | |
"vendor": "dotclear", | |
"product": "dotclear", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5690", | |
"vendor": "dotclear", | |
"product": "dotclear", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5691", | |
"vendor": "dell", | |
"product": "sonicwall_global_management_system", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5692", | |
"vendor": "piwigo", | |
"product": "piwigo", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-5693", | |
"vendor": "linuxmagic", | |
"product": "magicspam", | |
"cwe": "CWE-532" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5694", | |
"vendor": "fop2", | |
"product": "flash_operator_panel", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5695", | |
"vendor": "wpjobboard", | |
"product": "wpjobboard", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5696", | |
"vendor": "ijoomla", | |
"product": "com_adagency", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5697", | |
"vendor": "icyphoenix", | |
"product": "icyphoenix", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5698", | |
"vendor": "wizardmac", | |
"product": "readstat", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5700", | |
"vendor": "magicwinmail", | |
"product": "winmail_server", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5701", | |
"vendor": "iolo", | |
"product": "system_shield", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5702", | |
"vendor": "debian,transmissionbt", | |
"product": "debian_linux,transmission", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5703", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-5704", | |
"vendor": "debian,openocd", | |
"product": "debian_linux,open_on-chip_debugger", | |
"cwe": "CWE-134" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5705", | |
"vendor": "reservo", | |
"product": "image_hosting", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5706", | |
"vendor": "octopus", | |
"product": "octopus_deploy", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5709", | |
"vendor": "mit", | |
"product": "kerberos", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-5710", | |
"vendor": "mit", | |
"product": "kerberos", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5711", | |
"vendor": "php", | |
"product": "php", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5712", | |
"vendor": "php", | |
"product": "php", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5713", | |
"vendor": "malwarefox", | |
"product": "anti-malware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5714", | |
"vendor": "malwarefox", | |
"product": "anti-malware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5715", | |
"vendor": "sugarcrm", | |
"product": "sugarcrm", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5720", | |
"vendor": "dodocool", | |
"product": "dc38_firmware", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5721", | |
"vendor": "asuswrt-merlin_project", | |
"product": "asuswrt-merlin", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5723", | |
"vendor": "barni", | |
"product": "master_ip_camera01_firmware", | |
"cwe": "CWE-798" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5724", | |
"vendor": "barni", | |
"product": "master_ip_camera01_firmware", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5725", | |
"vendor": "barni", | |
"product": "master_ip_camera01_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5726", | |
"vendor": "barni", | |
"product": "master_ip_camera01_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5727", | |
"vendor": "openjpeg", | |
"product": "openjpeg", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5728", | |
"vendor": "cobham", | |
"product": "seatel_121_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5747", | |
"vendor": "lrzip_project", | |
"product": "lrzip", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5748", | |
"vendor": "redhat", | |
"product": "libvirt", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5749", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2018-5750", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5759", | |
"vendor": "artifex", | |
"product": "mujs", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5761", | |
"vendor": "rubrik", | |
"product": "cdm", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5764", | |
"vendor": "samba", | |
"product": "rsync", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5766", | |
"vendor": "libav", | |
"product": "libav", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5772", | |
"vendor": "exiv2", | |
"product": "exiv2", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5773", | |
"vendor": "python-markdown2_project", | |
"product": "python-markdown2", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5776", | |
"vendor": "wordpress", | |
"product": "wordpress", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5777", | |
"vendor": "ipswitch", | |
"product": "whatsup_gold", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5778", | |
"vendor": "ipswitch", | |
"product": "whatsup_gold", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5783", | |
"vendor": "podofo_project", | |
"product": "podofo", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5784", | |
"vendor": "libtiff", | |
"product": "libtiff", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5785", | |
"vendor": "openjpeg", | |
"product": "openjpeg", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5786", | |
"vendor": "long_range_zip_project", | |
"product": "long_range_zip", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5787", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5788", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5789", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2018-5790", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5791", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5792", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5793", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5794", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2018-5795", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-5796", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2018-5797", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5950", | |
"vendor": "gnu", | |
"product": "mailman", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-5954", | |
"vendor": "phpfreechat", | |
"product": "phpfreechat", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5955", | |
"vendor": "smartmobilesoftware", | |
"product": "gitstack", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5956", | |
"vendor": "zillya", | |
"product": "zillya!_antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-5957", | |
"vendor": "zillya", | |
"product": "zillya!_antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-5958", | |
"vendor": "zillya", | |
"product": "zillya!_antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-5960", | |
"vendor": "tribalsystems", | |
"product": "content_management_system", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5961", | |
"vendor": "centos-webpanel", | |
"product": "centos_web_panel", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-5962", | |
"vendor": "centos-webpanel", | |
"product": "centos_web_panel", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5963", | |
"vendor": "cmsmadesimple", | |
"product": "cms_made_simple", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5964", | |
"vendor": "cmsmadesimple", | |
"product": "cms_made_simple", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5965", | |
"vendor": "cmsmadesimple", | |
"product": "cms_made_simple", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-5967", | |
"vendor": "netis-systems", | |
"product": "wf2419_firmware", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2018-5968", | |
"vendor": "fasterxml", | |
"product": "jackson-databind", | |
"cwe": "CWE-502,CWE-184" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5969", | |
"vendor": "photography_cms_project", | |
"product": "photography_cms", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5970", | |
"vendor": "techjoomla", | |
"product": "jgive", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5971", | |
"vendor": "ordasoft", | |
"product": "medialibrary", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5972", | |
"vendor": "quickad_project", | |
"product": "quickad", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5973", | |
"vendor": "eihitech", | |
"product": "professional_local_directory_script", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5974", | |
"vendor": "albonico", | |
"product": "simplecalendar", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5975", | |
"vendor": "thekrotek", | |
"product": "smart_shoutbox", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5976", | |
"vendor": "rsvp_invitation_online_project", | |
"product": "rsvp_invitation_online", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5977", | |
"vendor": "getaffiligator", | |
"product": "affiligator", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5978", | |
"vendor": "zechat_project", | |
"product": "zechat", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5979", | |
"vendor": "wchat_project", | |
"product": "wchat", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5980", | |
"vendor": "solidres", | |
"product": "solidres", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5981", | |
"vendor": "web-dorado", | |
"product": "gallery_wd", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5982", | |
"vendor": "ordasoft", | |
"product": "advertisement_board", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5984", | |
"vendor": "tumder_project", | |
"product": "tumder", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5985", | |
"vendor": "livecrm", | |
"product": "livecrm_saas_cloud", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5986", | |
"vendor": "easy_car_script_project", | |
"product": "easy_car_script", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5988", | |
"vendor": "flexible_poll_project", | |
"product": "flexible_poll", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5990", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5991", | |
"vendor": "web-dorado", | |
"product": "form_maker", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5992", | |
"vendor": "staff_master_project", | |
"product": "staff_master", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5993", | |
"vendor": "aist_project", | |
"product": "aist", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-5994", | |
"vendor": "joomsky", | |
"product": "js_jobs", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-5996", | |
"vendor": "7-zip,debian", | |
"product": "7-zip,p7zip,debian_linux", | |
"cwe": "CWE-388" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5997", | |
"vendor": "ravpower", | |
"product": "filehub_firmware", | |
"cwe": "CWE-434,CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-5999", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-6000", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-16" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6001", | |
"vendor": "webartisan", | |
"product": "soundy_audio_playlist", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6002", | |
"vendor": "webartisan", | |
"product": "soundy_background_music", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6003", | |
"vendor": "gnu,fedoraproject", | |
"product": "fedora,libtasn1", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6004", | |
"vendor": "techsolsystem", | |
"product": "file_download_tracker", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6005", | |
"vendor": "realpin_project", | |
"product": "realpin", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6006", | |
"vendor": "joomsky", | |
"product": "js_autoz", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6007", | |
"vendor": "joomsky", | |
"product": "js_support_ticket", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6008", | |
"vendor": "joomlatag", | |
"product": "jtag_members_directory", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6009", | |
"vendor": "yiiframework", | |
"product": "yiiframework", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6010", | |
"vendor": "yiiframework", | |
"product": "yiiframework", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6013", | |
"vendor": "bigtreecms", | |
"product": "bigtree_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6014", | |
"vendor": "subsonic", | |
"product": "subsonic", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6015", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-6017", | |
"vendor": "tinder", | |
"product": "tinder", | |
"cwe": "CWE-310" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-6018", | |
"vendor": "tinder", | |
"product": "tinder", | |
"cwe": "CWE-310" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2018-6022", | |
"vendor": "5none", | |
"product": "nonecms", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6024", | |
"vendor": "thethinkery", | |
"product": "project_log", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6029", | |
"vendor": "5none", | |
"product": "nonecms", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6184", | |
"vendor": "zeit", | |
"product": "next.js", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-6186", | |
"vendor": "citrix", | |
"product": "netscaler", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6187", | |
"vendor": "artifex", | |
"product": "mupdf", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6190", | |
"vendor": "netis-systems", | |
"product": "wf2419_firmware", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6191", | |
"vendor": "artifex", | |
"product": "mujs", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6192", | |
"vendor": "artifex", | |
"product": "mupdf", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2018-6193", | |
"vendor": "routers2_project", | |
"product": "routers2", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6194", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-6195", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6196", | |
"vendor": "w3m_project", | |
"product": "w3m", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6197", | |
"vendor": "w3m_project", | |
"product": "w3m", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2018-6198", | |
"vendor": "w3m_project", | |
"product": "w3m", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-6200", | |
"vendor": "vbulletin", | |
"product": "vbulletin", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6201", | |
"vendor": "escanav", | |
"product": "anti-virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6202", | |
"vendor": "escanav", | |
"product": "anti-virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6203", | |
"vendor": "escanav", | |
"product": "anti-virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6204", | |
"vendor": "maxpcsecure", | |
"product": "anti_virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6205", | |
"vendor": "maxpcsecure", | |
"product": "anti_virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6206", | |
"vendor": "maxpcsecure", | |
"product": "anti_virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6207", | |
"vendor": "maxpcsecure", | |
"product": "anti_virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6208", | |
"vendor": "maxpcsecure", | |
"product": "anti_virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6209", | |
"vendor": "maxpcsecure", | |
"product": "anti_virus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6217", | |
"vendor": "kingsoftstore", | |
"product": "kingsoft_wps_office", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6288", | |
"vendor": "kaspersky", | |
"product": "secure_mail_gateway", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-6289", | |
"vendor": "kaspersky", | |
"product": "secure_mail_gateway", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-6290", | |
"vendor": "kaspersky", | |
"product": "secure_mail_gateway", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6291", | |
"vendor": "kaspersky", | |
"product": "secure_mail_gateway", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-6292", | |
"vendor": "hyland", | |
"product": "saperion_web_client", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6293", | |
"vendor": "hyland", | |
"product": "saperion_web_client", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6308", | |
"vendor": "sugarcrm", | |
"product": "sugarcrm", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6313", | |
"vendor": "wbce", | |
"product": "wbce_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6315", | |
"vendor": "libming", | |
"product": "libming", | |
"cwe": "CWE-125,CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-6317", | |
"vendor": "claymore_dual_miner_project", | |
"product": "claymore_dual_miner", | |
"cwe": "CWE-134" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-6318", | |
"vendor": "sophos", | |
"product": "sophos_tester", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-6319", | |
"vendor": "sophos", | |
"product": "sophos_tester", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6323", | |
"vendor": "gnu", | |
"product": "binutils", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6352", | |
"vendor": "podofo_project", | |
"product": "podofo", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-6353", | |
"vendor": "electrum", | |
"product": "electrum", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6354", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6355", | |
"vendor": "iball", | |
"product": "ib-wrb302n_firmware", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6357", | |
"vendor": "acurax", | |
"product": "social_media_widget", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6358", | |
"vendor": "libming", | |
"product": "libming", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6359", | |
"vendor": "libming", | |
"product": "libming", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6360", | |
"vendor": "debian,mpv", | |
"product": "debian_linux,mpv", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6363", | |
"vendor": "task_rabbit_clone_project", | |
"product": "task_rabbit_clone", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6364", | |
"vendor": "multilanguage_real_estate_mlm_script_project", | |
"product": "multilanguage_real_estate_mlm_script", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6365", | |
"vendor": "datacomponents", | |
"product": "tsitebuilder", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6367", | |
"vendor": "vastal", | |
"product": "i-tech_buddy_zone_facebook_clone", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6368", | |
"vendor": "comdev", | |
"product": "jomestate_pro", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6370", | |
"vendor": "neojoomla", | |
"product": "neorecruit", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6372", | |
"vendor": "joombooking", | |
"product": "jb_bus", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6373", | |
"vendor": "fastballproductions", | |
"product": "fastball", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-6374", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6376", | |
"vendor": "joomla", | |
"product": "joomla!", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6377", | |
"vendor": "joomla", | |
"product": "joomla!", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6379", | |
"vendor": "joomla", | |
"product": "joomla!", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6380", | |
"vendor": "joomla", | |
"product": "joomla!", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6381", | |
"vendor": "zziplib_project", | |
"product": "zziplib", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-6382", | |
"vendor": "mantisbt", | |
"product": "mantisbt", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-6383", | |
"vendor": "monstra", | |
"product": "monstra", | |
"cwe": "CWE-184" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2018-6384", | |
"vendor": "nsclient", | |
"product": "nsclient++", | |
"cwe": "CWE-428" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-6387", | |
"vendor": "iball", | |
"product": "ib-wra150n_firmware", | |
"cwe": "CWE-798" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2018-6388", | |
"vendor": "iball", | |
"product": "ib-wra150n_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6389", | |
"vendor": "wordpress", | |
"product": "wordpress", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6390", | |
"vendor": "ksosoft", | |
"product": "wps_office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6391", | |
"vendor": "netis-systems", | |
"product": "wf2419_firmware", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6392", | |
"vendor": "ffmpeg", | |
"product": "ffmpeg", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-6393", | |
"vendor": "freepbx", | |
"product": "freepbx", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6394", | |
"vendor": "techjoomla", | |
"product": "invitex", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6395", | |
"vendor": "joomlacalendars", | |
"product": "visual_calendar", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6396", | |
"vendor": "google_map_landkarten_project", | |
"product": "google_map_landkarten", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6397", | |
"vendor": "joomlacalendars", | |
"product": "picture_calendar", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6398", | |
"vendor": "joomlacalendars", | |
"product": "event_calendar", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6405", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6406", | |
"vendor": "webmproject", | |
"product": "libwebm", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-6407", | |
"vendor": "conceptronic", | |
"product": "cipcamptiwl_web_firmware,cipcamptiwl_firmware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6408", | |
"vendor": "conceptronic", | |
"product": "cipcamptiwl_web_firmware,cipcamptiwl_firmware", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6412", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6460", | |
"vendor": "anchorfree", | |
"product": "hotspot_shield", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6462", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6464", | |
"vendor": "simditor_project", | |
"product": "simditor", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6465", | |
"vendor": "wp-property-hive", | |
"product": "propertyhive", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6466", | |
"vendor": "flickrrss_project", | |
"product": "flickrrss", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6467", | |
"vendor": "flickrrss_project", | |
"product": "flickrrss", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6468", | |
"vendor": "flickrrss_project", | |
"product": "flickrrss", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6469", | |
"vendor": "flickrrss_project", | |
"product": "flickrrss", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6470", | |
"vendor": "nibbleblog", | |
"product": "nibbleblog", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6471", | |
"vendor": "superantispyware", | |
"product": "superantispyware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6472", | |
"vendor": "superantispyware", | |
"product": "superantispyware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6473", | |
"vendor": "superantispyware", | |
"product": "superantispyware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6474", | |
"vendor": "superantispyware", | |
"product": "superantispyware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2018-6475", | |
"vendor": "superantispyware", | |
"product": "superantispyware", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-6476", | |
"vendor": "superantispyware", | |
"product": "superantispyware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2018-6479", | |
"vendor": "netwavesystems", | |
"product": "ip_camera_firmware", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6480", | |
"vendor": "ccn-lite", | |
"product": "ccn-lite", | |
"cwe": "CWE-704" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6484", | |
"vendor": "zziplib_project", | |
"product": "zziplib", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6485", | |
"vendor": "gnu", | |
"product": "glibc", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6486", | |
"vendor": "microfocus", | |
"product": "fortify_audit_workbench,fortify_software_security_center", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6506", | |
"vendor": "minibb", | |
"product": "minibb", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-6508", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-134" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6519", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2018-6520", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6521", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6522", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6523", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6524", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6525", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6526", | |
"vendor": "mantisbt", | |
"product": "mantisbt", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2018-6536", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6537", | |
"vendor": "flexense", | |
"product": "syncbreeze", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6540", | |
"vendor": "zziplib_project", | |
"product": "zziplib", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6541", | |
"vendor": "zziplib_project", | |
"product": "zziplib", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6542", | |
"vendor": "zziplib_project", | |
"product": "zziplib", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6543", | |
"vendor": "gnu", | |
"product": "binutils", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6544", | |
"vendor": "artifex", | |
"product": "mupdf", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6545", | |
"vendor": "ipswitch", | |
"product": "moveit", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6548", | |
"vendor": "webmproject", | |
"product": "libwebm", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6550", | |
"vendor": "monstra", | |
"product": "monstra", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6551", | |
"vendor": "gnu", | |
"product": "glibc", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-6560", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6561", | |
"vendor": "dojotoolkit", | |
"product": "dojo", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6575", | |
"vendor": "jextn", | |
"product": "classified", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6576", | |
"vendor": "ezcode", | |
"product": "event_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6577", | |
"vendor": "jextn", | |
"product": "membership", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6578", | |
"vendor": "jextn", | |
"product": "je_paypervideo", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6579", | |
"vendor": "jextn", | |
"product": "reverse_auction", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6580", | |
"vendor": "janguo", | |
"product": "jimtawl", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6581", | |
"vendor": "joommasters", | |
"product": "jms_music", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6582", | |
"vendor": "zh_googlemap_project", | |
"product": "zh_googlemap", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6583", | |
"vendor": "quanticalabs", | |
"product": "timetable_responsive_schedule", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6584", | |
"vendor": "dthdevelopment", | |
"product": "dt_register", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6585", | |
"vendor": "techjoomla", | |
"product": "jticketing", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2018-6596", | |
"vendor": "debian", | |
"product": "debian_linux", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6604", | |
"vendor": "zh_yandexmap_project", | |
"product": "zh_yandexmap", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6605", | |
"vendor": "zh_baidumap_project", | |
"product": "zh_baidumap", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2018-6606", | |
"vendor": "malwarefox", | |
"product": "antimalware", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6609", | |
"vendor": "jsp_tickets_project", | |
"product": "jsp_tickets", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6610", | |
"vendor": "jlike_project", | |
"product": "jlike", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6611", | |
"vendor": "openmpt", | |
"product": "openmpt", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6612", | |
"vendor": "jhead_project", | |
"product": "jhead", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6616", | |
"vendor": "openjpeg", | |
"product": "openjpeg", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6620", | |
"vendor": "odoo", | |
"product": "odoo", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6621", | |
"vendor": "ffmpeg", | |
"product": "ffmpeg", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6625", | |
"vendor": "watchdogdevelopment", | |
"product": "anti-malware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6626", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6627", | |
"vendor": "watchdogdevelopment", | |
"product": "anti-malware", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6628", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6629", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6630", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6631", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6632", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6633", | |
"vendor": "micropoint", | |
"product": "proactive_defense", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6644", | |
"vendor": "sblim_project", | |
"product": "small_footprint_cim_broker", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6655", | |
"vendor": "doctor_search_script_project", | |
"product": "doctor_search_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6758", | |
"vendor": "unbit", | |
"product": "uwsgi", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6767", | |
"vendor": "wavpack", | |
"product": "wavpack", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6768", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6769", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6770", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6771", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6772", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6773", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6774", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6775", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6776", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6777", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6778", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6779", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6780", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6781", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6782", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6783", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6784", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6785", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6786", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6787", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2018-6788", | |
"vendor": "jiangmin", | |
"product": "antivirus", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-6792", | |
"vendor": "saifor", | |
"product": "cvms_hub", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6795", | |
"vendor": "naukri_clone_script_project", | |
"product": "naukri_clone_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6796", | |
"vendor": "multilanguage_real_estate_mlm_script_project", | |
"product": "multilanguage_real_estate_mlm_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6799", | |
"vendor": "debian,graphicsmagick", | |
"product": "debian_linux,graphicsmagick", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6806", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6824", | |
"vendor": "cozy", | |
"product": "cozy", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2018-6825", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-798" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2018-6826", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-6827", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6834", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6844", | |
"vendor": "mybb", | |
"product": "mybb", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6845", | |
"vendor": "olx_clone_project", | |
"product": "olx_clone", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6846", | |
"vendor": "zblogcn", | |
"product": "z-blogphp", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6858", | |
"vendor": "facebook_clone_project", | |
"product": "facebook_clone", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-6860", | |
"vendor": "schools_alert_management_project", | |
"product": "schools_alert_management", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6861", | |
"vendor": "lawyer_search_project", | |
"product": "lawyer_search", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6862", | |
"vendor": "bitcoin_mlm_project", | |
"product": "bitcoin_mlm", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6863", | |
"vendor": "select_your_college_script_project", | |
"product": "select_your_college_script", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6864", | |
"vendor": "multireligion_responsive_matrimonial_project", | |
"product": "multireligion_responsive_matrimonial", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6866", | |
"vendor": "learning_and_examination_management_system_script_project", | |
"product": "learning_and_examination_management_system_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6867", | |
"vendor": "alibaba_clone_script_project", | |
"product": "alibaba_clone_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6868", | |
"vendor": "groupon_clone_script_project", | |
"product": "groupon_clone_script", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6871", | |
"vendor": "libreoffice", | |
"product": "libreoffice", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6876", | |
"vendor": "imagemagick,libfpx_project", | |
"product": "imagemagick,libfpx", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6878", | |
"vendor": "hot_scripts_clone_project", | |
"product": "hot_scripts_clone", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6880", | |
"vendor": "phome", | |
"product": "empirecms", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6881", | |
"vendor": "phome", | |
"product": "empirecms", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2018-6888", | |
"vendor": "typesettercms", | |
"product": "typesetter", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2018-6889", | |
"vendor": "typesettercms", | |
"product": "typesetter", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-6890", | |
"vendor": "wolfcms", | |
"product": "wolf_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6891", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6892", | |
"vendor": "cloudme", | |
"product": "sync", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6893", | |
"vendor": "finecms", | |
"product": "finecms", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6912", | |
"vendor": "ffmpeg", | |
"product": "ffmpeg", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-6928", | |
"vendor": "news_website_script_project", | |
"product": "news_website_script", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6943", | |
"vendor": "ultimatemember", | |
"product": "ultimatemember", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-6944", | |
"vendor": "ultimatemember", | |
"product": "ultimatemember", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-6952", | |
"vendor": "gnu", | |
"product": "patch", | |
"cwe": "CWE-415" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7050", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7051", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7052", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7053", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7054", | |
"vendor": "irssi", | |
"product": "irssi", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-7173", | |
"vendor": "xpdfreader", | |
"product": "xpdf", | |
"cwe": "CWE-172" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-7174", | |
"vendor": "xpdfreader", | |
"product": "xpdf", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-7175", | |
"vendor": "xpdfreader", | |
"product": "xpdf", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7177", | |
"vendor": "saxum2003", | |
"product": "numerology", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7178", | |
"vendor": "saxum2003", | |
"product": "saxum_picker", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7179", | |
"vendor": "squadmanagement_project", | |
"product": "squadmanagement", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7180", | |
"vendor": "saxum2003", | |
"product": "astro", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-7197", | |
"vendor": "pluck-cms", | |
"product": "pluck", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-7198", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-7260", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2018-7261", | |
"vendor": "radiantcms", | |
"product": "radiant_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2018-7280", | |
"vendor": "ninjaforms", | |
"product": "ninja_forms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7312", | |
"vendor": "alexandriabooklibrary", | |
"product": "alexandria_book_library", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7313", | |
"vendor": "cwjoomla", | |
"product": "cw_tags", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7314", | |
"vendor": "mlwebtechnologies", | |
"product": "prayercenter", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7315", | |
"vendor": "ek_rishta_project", | |
"product": "ek_rishta", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7318", | |
"vendor": "belitsoft", | |
"product": "checklist", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2018-7319", | |
"vendor": "os_property_real_estate_project", | |
"product": "os_property_real_estate", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7320", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7321", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7322", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7323", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7324", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7325", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7326", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7327", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7328", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7329", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7330", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7331", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7332", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7333", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7334", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7335", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7336", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7337", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7417", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7418", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7419", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7420", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2018-7421", | |
"vendor": "wireshark", | |
"product": "wireshark", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-7435", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-7436", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-7437", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-7438", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2018-7439", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0001", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0002", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0003", | |
"vendor": "microsoft", | |
"product": "word,sharepoint_enterprise_server", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0004", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0005", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0006", | |
"vendor": "microsoft", | |
"product": "sharepoint_server,office_compatibility_pack,excel,excel_viewer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0007", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0008", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0009", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0010", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0011", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0012", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0014", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,office,windows_7", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0015", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0016", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0017", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0018", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0019", | |
"vendor": "microsoft", | |
"product": "word", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0020", | |
"vendor": "microsoft", | |
"product": "office_web_apps,excel", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.7, | |
"cve_id": "CVE-2017-0021", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0022", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0023", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,edge,windows_server_2012,windows_8.1", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0024", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0025", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0026", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0027", | |
"vendor": "microsoft", | |
"product": "sharepoint_server,excel,office_compatibility_pack", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-0028", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0029", | |
"vendor": "microsoft", | |
"product": "word,office", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0030", | |
"vendor": "microsoft", | |
"product": "sharepoint_server,office_compatibility_pack,office,word,office_web_apps", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0031", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0032", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0033", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0034", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0035", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0037", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-704" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0038", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0039", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0040", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0042", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2017-0043", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_server_2008,windows_10,windows_server_2012", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0045", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0047", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0049", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0050", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_8,windows_server_2012,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2017-0051", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0052", | |
"vendor": "microsoft", | |
"product": "sharepoint_server,office_compatibility_pack,excel,excel_viewer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0053", | |
"vendor": "microsoft", | |
"product": "word,office_compatibility_pack,office,word_viewer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0055", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0056", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0057", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0058", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0059", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0060", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0061", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0062", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0063", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0064", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0065", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0066", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0067", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0068", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0069", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0070", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0071", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0072", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0073", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.3, | |
"cve_id": "CVE-2017-0074", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.4, | |
"cve_id": "CVE-2017-0075", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2017-0076", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0077", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0078", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0079", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_10,windows_8.1,windows_rt_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0080", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0081", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0082", | |
"vendor": "microsoft", | |
"product": "windows_10", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0083", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0084", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0085", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0086", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0087", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0088", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0089", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0090", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0091", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0092", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0093", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0094", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.9, | |
"cve_id": "CVE-2017-0095", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.3, | |
"cve_id": "CVE-2017-0096", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.3, | |
"cve_id": "CVE-2017-0097", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2017-0098", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.3, | |
"cve_id": "CVE-2017-0099", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-0100", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0101", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0102", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-0103", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_server_2012,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0104", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_server_2008,windows_server_2012", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0105", | |
"vendor": "microsoft", | |
"product": "word_for_mac,sharepoint_server,word_automation_services,office_compatibility_pack,office,word,office_web_apps", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0106", | |
"vendor": "microsoft", | |
"product": "outlook", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0107", | |
"vendor": "microsoft", | |
"product": "sharepoint_foundation", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0108", | |
"vendor": "microsoft", | |
"product": "silverlight,live_meeting,lync,windows_server_2008,skype_for_business,office,word_viewer,windows_7,windows_vista", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.4, | |
"cve_id": "CVE-2017-0109", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0110", | |
"vendor": "microsoft", | |
"product": "exchange_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0111", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0112", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0113", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0114", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0115", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0116", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0117", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0118", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0119", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0120", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0121", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0122", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0123", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0124", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0125", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0126", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0127", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0128", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0129", | |
"vendor": "microsoft", | |
"product": "lync_for_mac", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0130", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0131", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0132", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0133", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0134", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0135", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0136", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0137", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0138", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0140", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0141", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0143", | |
"vendor": "microsoft", | |
"product": "server_message_block", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0144", | |
"vendor": "microsoft", | |
"product": "server_message_block", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0145", | |
"vendor": "microsoft", | |
"product": "server_message_block", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0146", | |
"vendor": "microsoft", | |
"product": "server_message_block", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0147", | |
"vendor": "microsoft", | |
"product": "server_message_block", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0148", | |
"vendor": "microsoft", | |
"product": "server_message_block", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0149", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0150", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0151", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0152", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0154", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0155", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0156", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0158", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0159", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2012", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0160", | |
"vendor": "microsoft", | |
"product": ".net_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0161", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-362" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.4, | |
"cve_id": "CVE-2017-0162", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_server_2016,windows_10,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.4, | |
"cve_id": "CVE-2017-0163", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0164", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0165", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_10,windows_8.1,windows_rt_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0166", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0167", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-0168", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.2, | |
"cve_id": "CVE-2017-0169", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0170", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0171", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_server_2008,windows_server_2012", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0173", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2017-0174", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0175", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0176", | |
"vendor": "microsoft", | |
"product": "windows_xp,windows_server_2003", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 5.2, | |
"cve_id": "CVE-2017-0178", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_server_2016,windows_10,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-0179", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_server_2016,windows_10,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.4, | |
"cve_id": "CVE-2017-0180", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.4, | |
"cve_id": "CVE-2017-0181", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-0182", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-0183", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 5.2, | |
"cve_id": "CVE-2017-0184", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-0185", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_server_2016,windows_10,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-0186", | |
"vendor": "microsoft", | |
"product": "windows_server_2012,windows_server_2016,windows_10,windows_8.1", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0188", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0189", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0190", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0191", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0192", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7,windows_vista", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0193", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0194", | |
"vendor": "microsoft", | |
"product": "excel,office_compatibility_pack", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0195", | |
"vendor": "microsoft", | |
"product": "excel_web_app,office_web_apps_server,office_online_server,sharepoint_server,office_web_apps", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0196", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0197", | |
"vendor": "microsoft", | |
"product": "onenote", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0199", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_server_2012,office,windows_7,windows_vista", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0200", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0201", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0202", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0203", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0204", | |
"vendor": "microsoft", | |
"product": "outlook", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0205", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0207", | |
"vendor": "microsoft", | |
"product": "outlook", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0208", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0210", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0211", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.4, | |
"cve_id": "CVE-2017-0212", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0213", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-0214", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0215", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0216", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0218", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0219", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0220", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_server_2012", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0221", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0222", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0223", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0224", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0226", | |
"vendor": "microsoft", | |
"product": "internet_explorer", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0227", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0228", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0229", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0230", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0231", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-0233", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0234", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0235", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0236", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0238", | |
"vendor": "microsoft", | |
"product": "internet_explorer,edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0240", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.4, | |
"cve_id": "CVE-2017-0241", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0242", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0243", | |
"vendor": "microsoft", | |
"product": "business_productivity_servers,web_applications,office", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0244", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0245", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,windows_server_2012", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0246", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0247", | |
"vendor": "microsoft", | |
"product": "microsoft.aspnetcore.mvc.webapicompatshim,microsoft.aspnetcore.mvc.apiexplorer,microsoft.aspnetcore.mvc.formatters.json,microsoft.aspnetcore.mvc.core,microsoft.aspnetcore.mvc.cors,microsoft.aspnetcore.mvc.localization,microsoft.aspnetcore.mvc.taghelpers,microsoft.aspnetcore.mvc.razor.host,system.net.http.winhttphandler,microsoft.aspnetcore.mvc.viewfeatures,microsoft.aspnetcore.mvc.abstractions,microsoft.aspnetcore.mvc.dataannotations,system.net.websockets.client,system.text.encodings.web,system.net.security,system.net.http,microsoft.aspnetcore.mvc.razor,microsoft.aspnetcore.mvc.formatters.xml,microsoft.aspnetcore.mvc", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0248", | |
"vendor": "microsoft", | |
"product": ".net_framework", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0249", | |
"vendor": "microsoft", | |
"product": "microsoft.aspnetcore.mvc.webapicompatshim,microsoft.aspnetcore.mvc.apiexplorer,microsoft.aspnetcore.mvc.formatters.json,microsoft.aspnetcore.mvc.core,microsoft.aspnetcore.mvc.cors,microsoft.aspnetcore.mvc.localization,microsoft.aspnetcore.mvc.taghelpers,microsoft.aspnetcore.mvc.razor.host,system.net.http.winhttphandler,microsoft.aspnetcore.mvc.viewfeatures,microsoft.aspnetcore.mvc.abstractions,microsoft.aspnetcore.mvc.dataannotations,system.net.websockets.client,system.text.encodings.web,system.net.security,system.net.http,microsoft.aspnetcore.mvc.razor,microsoft.aspnetcore.mvc.formatters.xml,microsoft.aspnetcore.mvc", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0250", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0252", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0254", | |
"vendor": "microsoft", | |
"product": "sharepoint_server,office_compatibility_pack,word_rt,office,word_viewer,word,office_web_apps", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0255", | |
"vendor": "microsoft", | |
"product": "sharepoint_foundation", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0256", | |
"vendor": "microsoft", | |
"product": "microsoft.aspnetcore.mvc.webapicompatshim,microsoft.aspnetcore.mvc.apiexplorer,microsoft.aspnetcore.mvc.formatters.json,microsoft.aspnetcore.mvc.core,microsoft.aspnetcore.mvc.cors,microsoft.aspnetcore.mvc.localization,microsoft.aspnetcore.mvc.taghelpers,microsoft.aspnetcore.mvc.razor.host,system.net.http.winhttphandler,microsoft.aspnetcore.mvc.viewfeatures,microsoft.aspnetcore.mvc.abstractions,microsoft.aspnetcore.mvc.dataannotations,system.net.websockets.client,system.text.encodings.web,system.net.security,system.net.http,microsoft.aspnetcore.mvc.razor,microsoft.aspnetcore.mvc.formatters.xml,microsoft.aspnetcore.mvc", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0258", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0259", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0260", | |
"vendor": "microsoft", | |
"product": "windows_server_2008,windows_7,office", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0261", | |
"vendor": "microsoft", | |
"product": "office", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0262", | |
"vendor": "microsoft", | |
"product": "office", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0263", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0264", | |
"vendor": "microsoft", | |
"product": "powerpoint_for_mac", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0265", | |
"vendor": "microsoft", | |
"product": "powerpoint_for_mac", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0266", | |
"vendor": "microsoft", | |
"product": "edge", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0267", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0268", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0269", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0270", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0271", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0272", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0273", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0274", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0275", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0276", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0277", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0278", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0279", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0280", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0281", | |
"vendor": "microsoft", | |
"product": "word,skype_for_business,sharepoint_foundation,office,office_online_server,sharepoint_server,office_web_apps,project_server", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0282", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0283", | |
"vendor": "microsoft", | |
"product": "silverlight,windows_server_2016,windows_10,lync,windows_server_2008,skype_for_business,office_word_viewer,windows_8.1,office,windows_server_2012,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0284", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0285", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0286", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0287", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0288", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0289", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0290", | |
"vendor": "microsoft", | |
"product": "windows_defender,forefront_security,malware_protection_engine", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0291", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0292", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2012,windows_8.1,word", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0293", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0294", | |
"vendor": "microsoft", | |
"product": "windows_rt_8.1,windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0295", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0296", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0297", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-0298", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0299", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-0300", | |
"vendor": "microsoft", | |
"product": "windows_server_2016,windows_10,windows_server_2008,windows_server_2012,windows_8.1,windows_7", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0301", | |
"vendor": "f5", | |
"product": "big-ip_access_policy_manager", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0302", | |
"vendor": "f5", | |
"product": "big-ip_access_policy_manager", | |
"cwe": "CWE-118" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0303", | |
"vendor": "f5", | |
"product": "big-ip_policy_enforcement_manager,big-ip_websafe,big-ip_link_controller,big-ip_access_policy_manager,big-ip_application_security_manager,big-ip_local_traffic_manager,big-ip_application_acceleration_manager,big-ip_advanced_firewall_manager", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-0304", | |
"vendor": "f5", | |
"product": "big-ip_advanced_firewall_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0305", | |
"vendor": "f5", | |
"product": "ssl_intercept_iapp", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0306", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0307", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0308", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0309", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-0310", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0311", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0312", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0313", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0314", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0315", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0316", | |
"vendor": "nvidia", | |
"product": "geforce_experience", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0317", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-0318", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-0319", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-0320", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0321", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0322", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-129" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0323", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0324", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0325", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0326", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0327", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0328", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0329", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0330", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0331", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0332", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0333", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0334", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0335", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0336", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0337", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0338", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0339", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0340", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0341", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0342", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-682" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-0343", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-362" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0344", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0345", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-129" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0346", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0347", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-129" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0348", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0349", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0350", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0351", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0352", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-0353", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.7, | |
"cve_id": "CVE-2017-0354", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-0355", | |
"vendor": "nvidia", | |
"product": "gpu_driver", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0360", | |
"vendor": "tryton", | |
"product": "tryton", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0373", | |
"vendor": "config-model_project", | |
"product": "config-model", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0374", | |
"vendor": "config-model_project", | |
"product": "config-model", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0375", | |
"vendor": "torproject", | |
"product": "tor", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0376", | |
"vendor": "torproject", | |
"product": "tor", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0377", | |
"vendor": "torproject", | |
"product": "tor", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0378", | |
"vendor": "phamm", | |
"product": "phamm", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0379", | |
"vendor": "gnupg,debian", | |
"product": "debian_linux,libgcrypt", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0380", | |
"vendor": "torproject", | |
"product": "tor", | |
"cwe": "CWE-532" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0381", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0382", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0383", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0384", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0385", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0386", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0387", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0388", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0389", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0390", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0391", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0392", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0393", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0394", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0395", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0396", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0397", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0398", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0399", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0400", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0401", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0402", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0403", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0404", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0405", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0406", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0407", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0408", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0409", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0410", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0411", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0412", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0413", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0414", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0415", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0416", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0417", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0418", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0419", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0420", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0421", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0422", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.9, | |
"cve_id": "CVE-2017-0423", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200,CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0424", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0425", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0426", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0427", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0428", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0429", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0430", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0432", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0433", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0434", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0435", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0436", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0437", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0438", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0439", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0440", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0441", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0442", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0443", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0444", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0445", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0446", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0447", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0448", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0449", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0450", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0451", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0452", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0453", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0454", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0455", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0456", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0457", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0458", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0459", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0460", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0461", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0462", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0463", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0464", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0465", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0466", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0467", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0468", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0469", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0470", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0471", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0472", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0473", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0474", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0475", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0476", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0477", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0478", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0479", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0480", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0481", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0482", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0483", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0484", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0485", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0486", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0487", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0488", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0489", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0490", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0491", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0492", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0493", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0494", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0495", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0496", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 5.4, | |
"cve_id": "CVE-2017-0497", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-0498", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0499", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0500", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0501", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0502", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0503", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0504", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0505", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0506", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0507", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0508", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0509", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0510", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0516", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0517", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0518", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0519", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0520", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0521", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0522", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0523", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0524", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0525", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0526", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0527", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0528", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0529", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0531", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0532", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0533", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0534", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0535", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0536", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0537", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0538", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0539", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0540", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0541", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0542", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0543", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0544", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0545", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0546", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0547", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0548", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0549", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0550", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0551", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0552", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0553", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0554", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0555", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0556", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0557", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0558", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0559", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0560", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-0561", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0562", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0563", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0564", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0565", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0566", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0567", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0568", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0569", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0570", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0571", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0572", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0573", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0574", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0575", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0576", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0577", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0578", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0579", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0580", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0581", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0582", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0583", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0584", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0585", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0586", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0587", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0588", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0589", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0590", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0591", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0592", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0593", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0594", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0595", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0596", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0597", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0598", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0599", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0600", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0601", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0602", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 5.4, | |
"cve_id": "CVE-2017-0603", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0604", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0606", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0607", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0608", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0609", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0610", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0611", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0612", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0613", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0614", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0615", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0616", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0617", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0618", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0619", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0620", | |
"vendor": "linux,google", | |
"product": "android,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0621", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0622", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0623", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0624", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0625", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0626", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0627", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0628", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0629", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0630", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0631", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0632", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0633", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0634", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0635", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0636", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0637", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0638", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0639", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0640", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0641", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0642", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0643", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0644", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0645", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0646", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0647", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0648", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-0649", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0650", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-0651", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0663", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0664", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0665", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0666", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0667", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0668", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0669", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0670", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0671", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0672", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0673", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0674", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0675", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0676", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0677", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0678", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0679", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0680", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0681", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0682", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0683", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0684", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0685", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0686", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0687", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0688", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0689", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0690", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0691", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0692", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0693", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0694", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0695", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0696", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0697", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0698", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0699", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0700", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0701", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0702", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0703", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0704", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0705", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0706", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0707", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0708", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0709", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0710", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0711", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0712", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0713", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0714", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0715", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0716", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0718", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0719", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0720", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0721", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0722", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0723", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0724", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0725", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0726", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0727", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0728", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0729", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0730", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0731", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0732", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0733", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0734", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0735", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0736", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0737", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0738", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0739", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0740", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0741", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0742", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0745", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0746", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0747", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0749", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0750", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0752", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0753", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0755", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0756", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0757", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0758", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0759", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0760", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0761", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0762", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0763", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0764", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0765", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0766", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0767", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0768", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0769", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0770", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0771", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0772", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0773", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0774", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0775", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0776", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0777", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0778", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200,CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0779", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0780", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.3, | |
"cve_id": "CVE-2017-0781", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.3, | |
"cve_id": "CVE-2017-0782", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2017-0783", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0784", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-0785", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0786", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0787", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0788", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0789", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0790", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-0791", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-0792", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0793", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0794", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0795", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0796", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0797", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0798", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0799", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0800", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0801", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0802", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0803", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0804", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0805", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0806", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-0807", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0808", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0809", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0810", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0811", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0812", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0813", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0814", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0815", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0816", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0817", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0818", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0819", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0820", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0822", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0823", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0824", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0825", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0826", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0827", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0828", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0829", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0830", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0831", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0832", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0833", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0834", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0835", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0836", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0837", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0838", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0839", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0840", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0841", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0842", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0843", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0845", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0846", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0847", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0848", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0849", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0850", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0851", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0852", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.5, | |
"cve_id": "CVE-2017-0853", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200,CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.5, | |
"cve_id": "CVE-2017-0854", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200,CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0855", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0857", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0858", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-0859", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0860", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0861", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0862", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0863", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0864", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-0865", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0866", | |
"vendor": "nvidia", | |
"product": "tegra_x1_firmware", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0869", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-416,CWE-190" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0870", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-0871", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0872", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0873", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0874", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0876", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0877", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-0878", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.5, | |
"cve_id": "CVE-2017-0879", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-0880", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0881", | |
"vendor": "zulip", | |
"product": "zulip", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0882", | |
"vendor": "gitlab", | |
"product": "gitlab", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-0883", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0884", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0885", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0886", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0887", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0888", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0889", | |
"vendor": "thoughtbot", | |
"product": "paperclip", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0890", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0891", | |
"vendor": "nextcloud", | |
"product": "nextcloud_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0892", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-384" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0893", | |
"vendor": "nextcloud", | |
"product": "nextcloud_server", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-0894", | |
"vendor": "nextcloud", | |
"product": "nextcloud", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-0895", | |
"vendor": "nextcloud", | |
"product": "nextcloud_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0896", | |
"vendor": "zulip", | |
"product": "zulip_server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0897", | |
"vendor": "expressionengine", | |
"product": "expressionengine", | |
"cwe": "CWE-331" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-0898", | |
"vendor": "ruby-lang", | |
"product": "ruby", | |
"cwe": "CWE-134" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0899", | |
"vendor": "rubygems", | |
"product": "rubygems", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-0900", | |
"vendor": "rubygems", | |
"product": "rubygems", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-0901", | |
"vendor": "rubygems", | |
"product": "rubygems", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0902", | |
"vendor": "rubygems", | |
"product": "rubygems", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0903", | |
"vendor": "rubygems", | |
"product": "rubygems", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-0904", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0905", | |
"vendor": "recurly", | |
"product": "recurly_client_ruby", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0906", | |
"vendor": "recurly", | |
"product": "recurly_client_python", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0907", | |
"vendor": "recurly", | |
"product": "recurly_client_.net", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-0909", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-0910", | |
"vendor": "zulip", | |
"product": "zulip_server", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10000", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000001", | |
"vendor": "fedoraproject", | |
"product": "fedmsg", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000002", | |
"vendor": "atutor", | |
"product": "atutor", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000003", | |
"vendor": "atutor", | |
"product": "atutor", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000004", | |
"vendor": "atutor", | |
"product": "atutor", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000005", | |
"vendor": "phpminiadmin_project", | |
"product": "phpminiadmin", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000006", | |
"vendor": "plotly", | |
"product": "plotly.js", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000007", | |
"vendor": "twistedmatrix", | |
"product": "txaws", | |
"cwe": "CWE-200,CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000008", | |
"vendor": "chyrp-lite_project", | |
"product": "chyrp_lite", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000009", | |
"vendor": "akeneo", | |
"product": "pim", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000010", | |
"vendor": "audacity", | |
"product": "audacity", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000011", | |
"vendor": "mywebsql", | |
"product": "mywebsql", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000012", | |
"vendor": "mysqldumper", | |
"product": "mysqldumper", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000013", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000014", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000015", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000016", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000017", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000018", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000020", | |
"vendor": "ecos", | |
"product": "embedded_web_servers", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000024", | |
"vendor": "gnome", | |
"product": "shotwell", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000025", | |
"vendor": "gnome", | |
"product": "epiphany", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000026", | |
"vendor": "chef_project", | |
"product": "mixlib-archive", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000027", | |
"vendor": "koozali", | |
"product": "sme_server", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000028", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000029", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000030", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000031", | |
"vendor": "cacti", | |
"product": "cacti", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000032", | |
"vendor": "cacti", | |
"product": "cacti", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000033", | |
"vendor": "vospari_forms_project", | |
"product": "vospari_forms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-1000034", | |
"vendor": "akka", | |
"product": "akka", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000035", | |
"vendor": "tt-rss", | |
"product": "tiny_tiny_rss", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000037", | |
"vendor": "rvm_project", | |
"product": "rvm", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000038", | |
"vendor": "relevanssi", | |
"product": "relevanssi", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000039", | |
"vendor": "framasoft", | |
"product": "framadate", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000042", | |
"vendor": "mapbox_project", | |
"product": "mapbox", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000043", | |
"vendor": "mapbox_project", | |
"product": "mapbox", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000044", | |
"vendor": "gnome", | |
"product": "gtk-vnc", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000046", | |
"vendor": "mautic", | |
"product": "mautic", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000047", | |
"vendor": "rbenv", | |
"product": "rbenv", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000048", | |
"vendor": "qs_project", | |
"product": "qs", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000050", | |
"vendor": "jasper_project", | |
"product": "jasper", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000051", | |
"vendor": "xwiki", | |
"product": "cryptpad", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000052", | |
"vendor": "elixir-plug", | |
"product": "plug", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000053", | |
"vendor": "elixir-plug", | |
"product": "plug", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000054", | |
"vendor": "rocketchat", | |
"product": "rocket.chat", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000056", | |
"vendor": "kubernetes", | |
"product": "kubernetes", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000058", | |
"vendor": "chevereto", | |
"product": "chevereto", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000059", | |
"vendor": "livehelperchat", | |
"product": "live_helper_chat", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000060", | |
"vendor": "eyesofnetwork", | |
"product": "eyesofnetwork", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000061", | |
"vendor": "xmlsec_project", | |
"product": "xmlsec", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000062", | |
"vendor": "kitto_project", | |
"product": "kitto", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000063", | |
"vendor": "kitto_project", | |
"product": "kitto", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000064", | |
"vendor": "kitto_project", | |
"product": "kitto", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000065", | |
"vendor": "openmediavault", | |
"product": "openmediavault", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000066", | |
"vendor": "keepass", | |
"product": "keepass", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000067", | |
"vendor": "modx", | |
"product": "revolution", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000068", | |
"vendor": "betterment", | |
"product": "test_track", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000069", | |
"vendor": "oauth2_proxy_project", | |
"product": "oauth2_proxy", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000070", | |
"vendor": "oauth2_proxy_project", | |
"product": "oauth2_proxy", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000071", | |
"vendor": "apereo", | |
"product": "phpcas", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000072", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-415" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000073", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000074", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000075", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000082", | |
"vendor": "freedesktop", | |
"product": "systemd", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000083", | |
"vendor": "gnome", | |
"product": "evince", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000084", | |
"vendor": "jenkins", | |
"product": "parameterized_trigger", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000085", | |
"vendor": "jenkins", | |
"product": "subversion", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-1000086", | |
"vendor": "jenkins", | |
"product": "periodic_backup", | |
"cwe": "CWE-352,CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000087", | |
"vendor": "jenkins", | |
"product": "github_branch_source", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000088", | |
"vendor": "jenkins", | |
"product": "sidebar_link", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000089", | |
"vendor": "jenkins", | |
"product": "pipeline:build_step", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000090", | |
"vendor": "jenkins", | |
"product": "role-based_authorization_strategy", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000091", | |
"vendor": "jenkins", | |
"product": "github_branch_source", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-1000092", | |
"vendor": "jenkins", | |
"product": "git", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000093", | |
"vendor": "jenkins", | |
"product": "poll_scm", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000094", | |
"vendor": "jenkins", | |
"product": "docker_commons", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000095", | |
"vendor": "jenkins", | |
"product": "script_security", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000096", | |
"vendor": "jenkins", | |
"product": "pipeline:groovy_plugin", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000097", | |
"vendor": "golang", | |
"product": "go", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000098", | |
"vendor": "golang", | |
"product": "go", | |
"cwe": "CWE-769" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000099", | |
"vendor": "haxx", | |
"product": "libcurl", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-10001", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000100", | |
"vendor": "haxx", | |
"product": "libcurl", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000101", | |
"vendor": "haxx", | |
"product": "curl", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000102", | |
"vendor": "jenkins", | |
"product": "static_analysis_utilities", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000103", | |
"vendor": "jenkins", | |
"product": "dry", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000104", | |
"vendor": "jenkins", | |
"product": "config_file_provider", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000105", | |
"vendor": "jenkins", | |
"product": "blue_ocean", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-1000106", | |
"vendor": "jenkins", | |
"product": "blue_ocean", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000107", | |
"vendor": "jenkins", | |
"product": "script_security", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000108", | |
"vendor": "jenkins", | |
"product": "pipeline-input-step", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000109", | |
"vendor": "jenkins", | |
"product": "owasp_dependency-check", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000110", | |
"vendor": "jenkins", | |
"product": "blue_ocean", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000111", | |
"vendor": "redhat,linux", | |
"product": "enterprise_linux,linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-1000112", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-362" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000113", | |
"vendor": "jenkins", | |
"product": "deploy_to_container", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000114", | |
"vendor": "jenkins", | |
"product": "datadog", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000115", | |
"vendor": "mercurial", | |
"product": "mercurial", | |
"cwe": "CWE-59" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000116", | |
"vendor": "mercurial", | |
"product": "mercurial", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000117", | |
"vendor": "git-scm", | |
"product": "git", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000118", | |
"vendor": "akka", | |
"product": "http_server", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000119", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000120", | |
"vendor": "frappe", | |
"product": "frappe", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000121", | |
"vendor": "webkitgtk", | |
"product": "webkitgtk+", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000122", | |
"vendor": "webkitgtk", | |
"product": "webkitgtk+", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000125", | |
"vendor": "codiad", | |
"product": "codiad", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000126", | |
"vendor": "exiv2", | |
"product": "exiv2", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000127", | |
"vendor": "exiv2", | |
"product": "exiv2", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000128", | |
"vendor": "exiv2", | |
"product": "exiv2", | |
"cwe": "CWE-125" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000129", | |
"vendor": "s9y", | |
"product": "serendipity", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000131", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000132", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000133", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000134", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000135", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-613" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000136", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-613" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000137", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000138", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-1000139", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000140", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-1000142", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000143", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000144", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000145", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000146", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-1000147", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000148", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000149", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000150", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-384" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000151", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000152", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000153", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000154", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000155", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-1000156", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000157", | |
"vendor": "mahara", | |
"product": "mahara", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000158", | |
"vendor": "python", | |
"product": "python", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000159", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000160", | |
"vendor": "ellislab", | |
"product": "expressionengine", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000163", | |
"vendor": "phoenixframework", | |
"product": "phoenix", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000164", | |
"vendor": "tine20", | |
"product": "tine_2.0", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000168", | |
"vendor": "sodiumoxide_project", | |
"product": "sodiumoxide", | |
"cwe": "CWE-320" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000169", | |
"vendor": "quickerbb_project", | |
"product": "quickerbb", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000170", | |
"vendor": "jqueryfiletree_project", | |
"product": "jqueryfiletree", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000171", | |
"vendor": "mahara", | |
"product": "mahara_mobile", | |
"cwe": "CWE-532" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000172", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000173", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000174", | |
"vendor": "swftools", | |
"product": "swftools", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000176", | |
"vendor": "swftools", | |
"product": "swftools", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000182", | |
"vendor": "swftools", | |
"product": "swftools", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000185", | |
"vendor": "swftools", | |
"product": "swftools", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000186", | |
"vendor": "swftools", | |
"product": "swftools", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000187", | |
"vendor": "swftools", | |
"product": "swftools", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000188", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000189", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-1000190", | |
"vendor": "simplexml_project", | |
"product": "simplexml", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-1000191", | |
"vendor": "jool", | |
"product": "jool", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000192", | |
"vendor": "cygnux", | |
"product": "syspass", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000193", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000194", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-1000195", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000196", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000197", | |
"vendor": "octobercms", | |
"product": "october_cms", | |
"cwe": "CWE-417" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000198", | |
"vendor": "tcmu-runner_project", | |
"product": "tcmu-runner", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000199", | |
"vendor": "tcmu-runner_project", | |
"product": "tcmu-runner", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10002", | |
"vendor": "oracle", | |
"product": "hospitality_inventory_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000200", | |
"vendor": "tcmu-runner_project", | |
"product": "tcmu-runner", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000201", | |
"vendor": "tcmu-runner_project", | |
"product": "tcmu-runner", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2017-1000203", | |
"vendor": "cern", | |
"product": "root", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000206", | |
"vendor": "htslib", | |
"product": "htslib", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000207", | |
"vendor": "swagger", | |
"product": "swagger-codegen,swagger-parser", | |
"cwe": "CWE-17" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000208", | |
"vendor": "swagger", | |
"product": "swagger-codegen,swagger-parser", | |
"cwe": "CWE-17" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000209", | |
"vendor": "nv-websocket-client_project", | |
"product": "nv-websocket-client", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000210", | |
"vendor": "altran", | |
"product": "picotcp", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000211", | |
"vendor": "lynx_project", | |
"product": "lynx", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000212", | |
"vendor": "alchemist-elixir", | |
"product": "alchemist-server", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000213", | |
"vendor": "wbce", | |
"product": "wbce_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000214", | |
"vendor": "gitphp_project", | |
"product": "gitphp", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000215", | |
"vendor": "xrootd", | |
"product": "xrootd", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000217", | |
"vendor": "opencast", | |
"product": "opencast", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000218", | |
"vendor": "lightftp_project", | |
"product": "lightftp", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000219", | |
"vendor": "windows-cpu_project", | |
"product": "windows-cpu", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000220", | |
"vendor": "pidusage_project", | |
"product": "pidusage", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000221", | |
"vendor": "apereo", | |
"product": "opencast", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000223", | |
"vendor": "modx", | |
"product": "modx_revolution", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000224", | |
"vendor": "embedplus", | |
"product": "youtube", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000225", | |
"vendor": "relevanssi", | |
"product": "relevanssi", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000226", | |
"vendor": "fullworks", | |
"product": "stop_user_enumeration", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000227", | |
"vendor": "parallelus", | |
"product": "salutation", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000228", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000229", | |
"vendor": "optipng_project", | |
"product": "optipng", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000230", | |
"vendor": "snap7_project", | |
"product": "snap7_server", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000231", | |
"vendor": "nlnetlabs", | |
"product": "ldns", | |
"cwe": "CWE-415" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000232", | |
"vendor": "nlnetlabs", | |
"product": "ldns", | |
"cwe": "CWE-415" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000234", | |
"vendor": "i-librarian", | |
"product": "i_librarian", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000235", | |
"vendor": "i-librarian", | |
"product": "i_librarian", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000236", | |
"vendor": "i-librarian", | |
"product": "i_librarian", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000237", | |
"vendor": "i-librarian", | |
"product": "i_librarian", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000238", | |
"vendor": "invoiceplane", | |
"product": "invoiceplane", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000239", | |
"vendor": "invoiceplane", | |
"product": "invoiceplane", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000240", | |
"vendor": "open-emr", | |
"product": "openemr", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000241", | |
"vendor": "open-emr", | |
"product": "openemr", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000242", | |
"vendor": "jenkins", | |
"product": "git_client", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000243", | |
"vendor": "jenkins", | |
"product": "favorite_plugin", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000244", | |
"vendor": "jenkins", | |
"product": "favorite_plugin", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000245", | |
"vendor": "jenkins", | |
"product": "ssh", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000246", | |
"vendor": "pysaml2_project", | |
"product": "pysaml2", | |
"cwe": "CWE-310" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000247", | |
"vendor": "codeigniter", | |
"product": "codeigniter", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000248", | |
"vendor": "redis-store", | |
"product": "redis-store", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000249", | |
"vendor": "file_project", | |
"product": "file", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-1000250", | |
"vendor": "bluez", | |
"product": "bluez", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.3, | |
"cve_id": "CVE-2017-1000251", | |
"vendor": "debian,linux", | |
"product": "debian_linux,linux_kernel", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000252", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000253", | |
"vendor": "redhat,centos", | |
"product": "centos,enterprise_linux", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000254", | |
"vendor": "haxx", | |
"product": "libcurl", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.6, | |
"cve_id": "CVE-2017-1000255", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000256", | |
"vendor": "libvirt_project", | |
"product": "libvirt", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-1000257", | |
"vendor": "debian,haxx", | |
"product": "libcurl,debian_linux", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-10003", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000353", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000354", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000355", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-502" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000356", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000357", | |
"vendor": "opendaylight", | |
"product": "opendaylight", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000358", | |
"vendor": "opendaylight", | |
"product": "opendaylight", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000359", | |
"vendor": "opendaylight", | |
"product": "opendaylight", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000360", | |
"vendor": "opendaylight", | |
"product": "opendaylight", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000361", | |
"vendor": "opendaylight", | |
"product": "opendaylight", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000362", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000363", | |
"vendor": "linux", | |
"product": "kernel", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.2, | |
"cve_id": "CVE-2017-1000364", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000365", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000366", | |
"vendor": "gnu,opensuse_project,openstack,suse,novell,redhat", | |
"product": "suse_linux_enterprise_desktop,linux_enterprise_server,enterprise_linux_server_long_life,enterprise_linux_server,suse_linux_enterprise_point_of_sale,enterprise_linux_server_eus,glibc,enterprise_linux,leap,enterprise_linux_aus,enterprise_linux_server_tus,cloud_magnum_orchestration,linux_enterprise_software_development_kit,linux_enterprise_server_for_raspberry_pi,suse_linux_enterprise_server,enterprise_linux_eus,linux_enterprise_for_sap", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-1000367", | |
"vendor": "todd_miller", | |
"product": "sudo", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000368", | |
"vendor": "todd_miller", | |
"product": "sudo", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000369", | |
"vendor": "exim", | |
"product": "exim", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000370", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000371", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000372", | |
"vendor": "openbsd", | |
"product": "openbsd", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-1000373", | |
"vendor": "openbsd", | |
"product": "openbsd", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000374", | |
"vendor": "netbsd", | |
"product": "netbsd", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000375", | |
"vendor": "netbsd", | |
"product": "netbsd", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-1000376", | |
"vendor": "redhat", | |
"product": "openshift,enterprise_linux,enterprise_virtualization_server", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000377", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000378", | |
"vendor": "netbsd", | |
"product": "netbsd", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000379", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000380", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000381", | |
"vendor": "c-ares_project", | |
"product": "c-ares", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000382", | |
"vendor": "vim", | |
"product": "vim", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000383", | |
"vendor": "gnu", | |
"product": "emacs", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000385", | |
"vendor": "debian,erlang", | |
"product": "debian_linux,erlang/otp", | |
"cwe": "CWE-310" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000386", | |
"vendor": "jenkins", | |
"product": "active_choices", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000387", | |
"vendor": "jenkins", | |
"product": "build-publisher", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000388", | |
"vendor": "jenkins", | |
"product": "dependency_graph_viewer", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000389", | |
"vendor": "jenkins", | |
"product": "global-build-stats", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000390", | |
"vendor": "jenkins", | |
"product": "multijob", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-1000391", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000392", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2017-1000393", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000394", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000395", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000396", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000397", | |
"vendor": "jenkins", | |
"product": "maven", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000398", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000399", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-10004", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000400", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.2, | |
"cve_id": "CVE-2017-1000401", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000402", | |
"vendor": "jenkins", | |
"product": "swarm", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000403", | |
"vendor": "jenkins", | |
"product": "speaks!", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000404", | |
"vendor": "jenkins", | |
"product": "delivery_pipeline", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-1000405", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-362" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000406", | |
"vendor": "opendaylight", | |
"product": "karaf", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.1, | |
"cve_id": "CVE-2017-1000407", | |
"vendor": "redhat,linux", | |
"product": "linux,linux_kernel", | |
"cwe": "CWE-754" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000408", | |
"vendor": "gnu", | |
"product": "glibc", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.9, | |
"cve_id": "CVE-2017-1000409", | |
"vendor": "gnu", | |
"product": "glibc", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000410", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000411", | |
"vendor": "opendaylight", | |
"product": "openflow,opendaylight", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000412", | |
"vendor": "linaro", | |
"product": "op-tee", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000413", | |
"vendor": "linaro", | |
"product": "op-tee", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000414", | |
"vendor": "impulseadventure", | |
"product": "jpegsnoop", | |
"cwe": "CWE-369" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000415", | |
"vendor": "matrixssl", | |
"product": "matrixssl", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000416", | |
"vendor": "axtls_project", | |
"product": "axtls", | |
"cwe": "CWE-17" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000417", | |
"vendor": "matrixssl", | |
"product": "matrixssl", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000418", | |
"vendor": "mindwerks", | |
"product": "wildmidi", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000419", | |
"vendor": "phpbb", | |
"product": "phpbb", | |
"cwe": "CWE-918" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-1000420", | |
"vendor": "syncthing", | |
"product": "syncthing", | |
"cwe": "CWE-59" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000421", | |
"vendor": "debian,gifsicle_project", | |
"product": "debian_linux,gifsicle", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000422", | |
"vendor": "gnome", | |
"product": "gdk-pixbuf", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000423", | |
"vendor": "b2evolution", | |
"product": "b2evolution", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000424", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000425", | |
"vendor": "liferay", | |
"product": "liferay_portal", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000426", | |
"vendor": "mapproxy", | |
"product": "mapproxy", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000427", | |
"vendor": "marked_project", | |
"product": "marked", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000428", | |
"vendor": "flatcore", | |
"product": "flatcore-cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000429", | |
"vendor": "finecms_project", | |
"product": "finecms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000430", | |
"vendor": "rust-base64_project", | |
"product": "rust-base64", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000431", | |
"vendor": "ez", | |
"product": "ez_publish", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-1000432", | |
"vendor": "vanillaforums", | |
"product": "vanilla_forums", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000433", | |
"vendor": "pysaml2_project", | |
"product": "pysaml2", | |
"cwe": "CWE-255" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000434", | |
"vendor": "furikake_project", | |
"product": "furikake", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000437", | |
"vendor": "creolabs", | |
"product": "gravity", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1000438", | |
"vendor": "openmicroscopy", | |
"product": "omero", | |
"cwe": "CWE-21" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000442", | |
"vendor": "passbolt", | |
"product": "passbolt_api", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000443", | |
"vendor": "openhacker_project", | |
"product": "openhacker", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000444", | |
"vendor": "openhacker_project", | |
"product": "openhacker", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000445", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000448", | |
"vendor": "structured-data", | |
"product": "structured_data_linter", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000450", | |
"vendor": "opencv", | |
"product": "opencv", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000451", | |
"vendor": "fs-git_project", | |
"product": "fs-git", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-1000452", | |
"vendor": "samlify_project", | |
"product": "samlify", | |
"cwe": "CWE-91" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000453", | |
"vendor": "cmsmadesimple", | |
"product": "cms_made_simple", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000454", | |
"vendor": "cmsmadesimple", | |
"product": "cms_made_simple", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000455", | |
"vendor": "gnu", | |
"product": "guixsd", | |
"cwe": "CWE-346" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000456", | |
"vendor": "freedesktop", | |
"product": "poppler", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000457", | |
"vendor": "mojoportal", | |
"product": "mojoportal", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000458", | |
"vendor": "bro", | |
"product": "bro", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000459", | |
"vendor": "leanote", | |
"product": "leanote", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000460", | |
"vendor": "libav,google,ffmpeg", | |
"product": "chrome,libav,ffmpeg", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000461", | |
"vendor": "brave", | |
"product": "browser", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000462", | |
"vendor": "bookstackapp", | |
"product": "bookstack", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000463", | |
"vendor": "leafpub", | |
"product": "leafpub", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000465", | |
"vendor": "sulu", | |
"product": "sulu-standard", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000466", | |
"vendor": "invoiceninja", | |
"product": "invoice_ninja", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000467", | |
"vendor": "lavalite", | |
"product": "lavalite", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-1000469", | |
"vendor": "cobbler_project", | |
"product": "cobbler", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000470", | |
"vendor": "embedthis", | |
"product": "goahead_web_server", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000471", | |
"vendor": "embedthis", | |
"product": "goahead", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000472", | |
"vendor": "debian", | |
"product": "debian_linux", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-1000473", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000474", | |
"vendor": "vehicle_sales_management_system_project", | |
"product": "vehicle_sales_management_system", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000475", | |
"vendor": "freesshd", | |
"product": "freesshd", | |
"cwe": "CWE-428" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.1, | |
"cve_id": "CVE-2017-1000476", | |
"vendor": "imagemagick", | |
"product": "imagemagick", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000477", | |
"vendor": "xmlbundle_project", | |
"product": "xmlbundle", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000478", | |
"vendor": "elabftw", | |
"product": "elabftw", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000479", | |
"vendor": "pfsense", | |
"product": "pfsense", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000480", | |
"vendor": "smarty", | |
"product": "smarty", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000481", | |
"vendor": "plone", | |
"product": "plone", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000482", | |
"vendor": "plone", | |
"product": "plone", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000483", | |
"vendor": "plone", | |
"product": "plone", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1000484", | |
"vendor": "plone", | |
"product": "plone", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-1000485", | |
"vendor": "nylas_mail_lives_project", | |
"product": "nylas_mail", | |
"cwe": "CWE-275" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000486", | |
"vendor": "primetek", | |
"product": "primefaces", | |
"cwe": "CWE-326" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000487", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000488", | |
"vendor": "mautic", | |
"product": "mautic", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000489", | |
"vendor": "mautic", | |
"product": "mautic", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000490", | |
"vendor": "mautic", | |
"product": "mautic", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000491", | |
"vendor": "shiba_project", | |
"product": "shiba", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000492", | |
"vendor": "leanote", | |
"product": "desktop", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000493", | |
"vendor": "rocket.chat", | |
"product": "rocket.chat", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-1000494", | |
"vendor": "miniupnp_project", | |
"product": "miniupnpd", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000495", | |
"vendor": "quickappscms", | |
"product": "quickapps_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000496", | |
"vendor": "commsy", | |
"product": "commsy", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000497", | |
"vendor": "pepperminty-wiki_project", | |
"product": "pepperminty-wiki", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000498", | |
"vendor": "androidsvg_project", | |
"product": "androidsvg", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000499", | |
"vendor": "phpmyadmin", | |
"product": "phpmyadmin", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10005", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1000500", | |
"vendor": "redhat", | |
"product": "single_sign_on,mobile_application_platform", | |
"cwe": "CWE-74" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1000501", | |
"vendor": "awstats", | |
"product": "awstats", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.0, | |
"cve_id": "CVE-2017-1000502", | |
"vendor": "jenkins", | |
"product": "ec2", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000503", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-362" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1000504", | |
"vendor": "jenkins", | |
"product": "jenkins", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1000505", | |
"vendor": "jenkins", | |
"product": "script_security", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000506", | |
"vendor": "mautic", | |
"product": "mautic", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000507", | |
"vendor": "cnvs", | |
"product": "canvas", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1000508", | |
"vendor": "invoiceplane", | |
"product": "invoiceplane", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000509", | |
"vendor": "dolibarr", | |
"product": "dolibarr", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1000510", | |
"vendor": "croogo", | |
"product": "croogo", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10006", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10007", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10008", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10009", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10010", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1001000", | |
"vendor": "wordpress", | |
"product": "wordpress", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1001001", | |
"vendor": "pluxml", | |
"product": "pluxml", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1001002", | |
"vendor": "mathjs", | |
"product": "math.js", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1001003", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-1001004", | |
"vendor": "", | |
"product": "", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10011", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10012", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-10013", | |
"vendor": "oracle", | |
"product": "sun_zfs_storage_appliance_kit_software", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10014", | |
"vendor": "oracle", | |
"product": "hospitality_hotel_mobile", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.7, | |
"cve_id": "CVE-2017-10015", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-10016", | |
"vendor": "oracle", | |
"product": "sun_zfs_storage_appliance_kit_software", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10017", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10018", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_strategic_sourcing", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10019", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-10020", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002000", | |
"vendor": "mobile-friendly-app-builder-by-easytouch_project", | |
"product": "mobile-friendly-app-builder-by-easytouch", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002001", | |
"vendor": "mobile-app-builder-by-wappress_project", | |
"product": "mobile-app-builder-by-wappress", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002002", | |
"vendor": "webapp-builder_project", | |
"product": "webapp-builder", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002003", | |
"vendor": "wp2android-turn-wp-site-into-android-app_project", | |
"product": "wp2android-turn-wp-site-into-android-app", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1002004", | |
"vendor": "dtracker_project", | |
"product": "dtracker", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1002005", | |
"vendor": "dtracker_project", | |
"product": "dtracker", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1002006", | |
"vendor": "dtracker_project", | |
"product": "dtracker", | |
"cwe": "CWE-285" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1002007", | |
"vendor": "dtracker_project", | |
"product": "dtracker", | |
"cwe": "CWE-285" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002008", | |
"vendor": "membership-simplified-for-oap-members-only_project", | |
"product": "membership-simplified-for-oap-members-only", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002009", | |
"vendor": "ontraport", | |
"product": "membership_simplified", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002010", | |
"vendor": "ontraport", | |
"product": "membership_simplified", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-1002011", | |
"vendor": "anblik", | |
"product": "image-gallery-with-slideshow", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002012", | |
"vendor": "anblik", | |
"product": "image-gallery-with-slideshow", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002013", | |
"vendor": "anblik", | |
"product": "image-gallery-with-slideshow", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002014", | |
"vendor": "anblik", | |
"product": "image-gallery-with-slideshow", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002015", | |
"vendor": "anblik", | |
"product": "image-gallery-with-slideshow", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002016", | |
"vendor": "flickr-picture-backup_project", | |
"product": "flickr-picture-backup", | |
"cwe": "CWE-434" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-1002017", | |
"vendor": "bobcares", | |
"product": "gift-certificate-creator", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002018", | |
"vendor": "eventr_project", | |
"product": "eventr", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002019", | |
"vendor": "eventr_project", | |
"product": "eventr", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002020", | |
"vendor": "surveys_project", | |
"product": "surveys", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002021", | |
"vendor": "surveys_project", | |
"product": "surveys", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002022", | |
"vendor": "surveys_project", | |
"product": "surveys", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002023", | |
"vendor": "daisythemes", | |
"product": "easy_team_manager", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1002024", | |
"vendor": "kindsoft", | |
"product": "kind_editor", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1002025", | |
"vendor": "add-edit-delete-listing-for-member-module_project", | |
"product": "add-edit-delete-listing-for-member-module", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-1002026", | |
"vendor": "eventespresso", | |
"product": "event_management_and_registration_system", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002027", | |
"vendor": "rayanehdownload", | |
"product": "rk-responsive-contact-form", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-1002028", | |
"vendor": "angrybyte", | |
"product": "gallery-transformation", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10021", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-1002100", | |
"vendor": "kubernetes", | |
"product": "kubernetes", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-1002150", | |
"vendor": "fedoraproject", | |
"product": "python-fedora", | |
"cwe": "CWE-601" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1002151", | |
"vendor": "pagure", | |
"product": "pagure", | |
"cwe": "CWE-285" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-1002153", | |
"vendor": "koji_project", | |
"product": "koji", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10022", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10023", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10024", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10025", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10026", | |
"vendor": "oracle", | |
"product": "soa_suite", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10027", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10028", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10029", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10030", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10031", | |
"vendor": "oracle", | |
"product": "communications_convergence", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10032", | |
"vendor": "oracle", | |
"product": "transportation_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-10033", | |
"vendor": "oracle", | |
"product": "webcenter_sites", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10034", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10035", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-10036", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10037", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10038", | |
"vendor": "oracle", | |
"product": "primavera_p6_enterprise_project_portfolio_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10039", | |
"vendor": "oracle", | |
"product": "agile_product_governance_and_compliance", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10040", | |
"vendor": "oracle", | |
"product": "webcenter_content", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10041", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-10042", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10043", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10044", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-10045", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10046", | |
"vendor": "oracle", | |
"product": "primavera_p6_enterprise_project_portfolio_management", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10047", | |
"vendor": "oracle", | |
"product": "micros_bellavita", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10048", | |
"vendor": "oracle", | |
"product": "enterprise_repository", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10049", | |
"vendor": "oracle", | |
"product": "siebel_core-server_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10050", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.7, | |
"cve_id": "CVE-2017-10051", | |
"vendor": "oracle", | |
"product": "outside_in_technology", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10052", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10053", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10054", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_materials_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10055", | |
"vendor": "oracle", | |
"product": "iplanet_web_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10056", | |
"vendor": "oracle", | |
"product": "hospitality_9700", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10057", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10058", | |
"vendor": "oracle", | |
"product": "business_intelligence", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10059", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10060", | |
"vendor": "oracle", | |
"product": "business_intelligence", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10061", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10062", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10063", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10064", | |
"vendor": "oracle", | |
"product": "hospitality_websuite8_cloud_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10065", | |
"vendor": "oracle", | |
"product": "retail_point-of-service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10066", | |
"vendor": "oracle", | |
"product": "e-business_suite_technology_stack", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-10067", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10068", | |
"vendor": "oracle", | |
"product": "business_intelligence", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10069", | |
"vendor": "oracle", | |
"product": "payment_gateway_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10070", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10071", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10072", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10073", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-10074", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10075", | |
"vendor": "oracle", | |
"product": "webcenter_content", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10076", | |
"vendor": "oracle", | |
"product": "hospitality_simphony_first_edition_venue_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10077", | |
"vendor": "oracle", | |
"product": "applications_dba", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10078", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10079", | |
"vendor": "oracle", | |
"product": "hospitality_suites_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10080", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10081", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10082", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10083", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10084", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10085", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10086", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10087", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10088", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10089", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10090", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10091", | |
"vendor": "oracle", | |
"product": "enterprise_manager_base_platform", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10092", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10093", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10094", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-10095", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10096", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10097", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10098", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10099", | |
"vendor": "oracle", | |
"product": "sparc-sun_system_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10100", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10101", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10102", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10103", | |
"vendor": "oracle", | |
"product": "flexcube_private_banking", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10104", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10105", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10106", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10107", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10108", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10109", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10110", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10111", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10112", | |
"vendor": "oracle", | |
"product": "istore", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10113", | |
"vendor": "oracle", | |
"product": "common_applications", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-10114", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10115", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-10116", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10117", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10118", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10119", | |
"vendor": "oracle", | |
"product": "service_bus", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-10120", | |
"vendor": "oracle", | |
"product": "database_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10121", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.2, | |
"cve_id": "CVE-2017-10122", | |
"vendor": "oracle", | |
"product": "solaris", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10123", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-10125", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10126", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10128", | |
"vendor": "oracle", | |
"product": "hospitality_websuite8_cloud_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10129", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10130", | |
"vendor": "oracle", | |
"product": "istore", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-10131", | |
"vendor": "oracle", | |
"product": "primavera_p6_enterprise_project_portfolio_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10132", | |
"vendor": "oracle", | |
"product": "hospitality_hotel_mobile", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10133", | |
"vendor": "oracle", | |
"product": "hospitality_hotel_mobile", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10134", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_eprocurement", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10135", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10136", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10137", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10141", | |
"vendor": "oracle", | |
"product": "outside_in_technology", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10142", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10143", | |
"vendor": "oracle", | |
"product": "customer_relationship_management_technical_foundation", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10144", | |
"vendor": "oracle", | |
"product": "applications_manager", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10145", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10146", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10147", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10148", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10149", | |
"vendor": "oracle", | |
"product": "primavera_unifier", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10150", | |
"vendor": "oracle", | |
"product": "primavera_unifier", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10151", | |
"vendor": "oracle", | |
"product": "identity_manager", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10152", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10153", | |
"vendor": "oracle", | |
"product": "communications_webrtc_session_controller", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10154", | |
"vendor": "oracle", | |
"product": "access_manager", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10155", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10156", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10157", | |
"vendor": "oracle", | |
"product": "business_intelligence_publisher", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10158", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10159", | |
"vendor": "oracle", | |
"product": "communications_policy_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10160", | |
"vendor": "oracle", | |
"product": "primavera_p6_enterprise_project_portfolio_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10161", | |
"vendor": "oracle", | |
"product": "agile_engineering_data_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10162", | |
"vendor": "oracle", | |
"product": "siebel_core-server_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10163", | |
"vendor": "oracle", | |
"product": "business_intelligence", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10164", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_fin_staffing_front_office", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10165", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10166", | |
"vendor": "oracle", | |
"product": "security_service,security_service_fmw", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10167", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-10168", | |
"vendor": "oracle", | |
"product": "hospitality_hotel_mobile", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10169", | |
"vendor": "oracle", | |
"product": "hospitality_9700", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10170", | |
"vendor": "oracle", | |
"product": "field_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10171", | |
"vendor": "oracle", | |
"product": "marketing", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10172", | |
"vendor": "oracle", | |
"product": "retail_open_commerce_platform_cloud_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10173", | |
"vendor": "oracle", | |
"product": "retail_open_commerce_platform_cloud_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10174", | |
"vendor": "oracle", | |
"product": "isupport", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10175", | |
"vendor": "oracle", | |
"product": "isupport", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10176", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10177", | |
"vendor": "oracle", | |
"product": "application_object_library", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10178", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10179", | |
"vendor": "oracle", | |
"product": "application_management_amp", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10180", | |
"vendor": "oracle", | |
"product": "customer_relationship_management_technical_foundation", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-10181", | |
"vendor": "oracle", | |
"product": "flexcube_direct_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10182", | |
"vendor": "oracle", | |
"product": "hospitality_opera_5_property_services", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10183", | |
"vendor": "oracle", | |
"product": "retail_xstore_point_of_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10184", | |
"vendor": "oracle", | |
"product": "field_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10185", | |
"vendor": "oracle", | |
"product": "customer_relationship_management_technical_foundation", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10186", | |
"vendor": "oracle", | |
"product": "istore", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10187", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10188", | |
"vendor": "oracle", | |
"product": "hospitality_hotel_mobile", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10189", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10190", | |
"vendor": "oracle", | |
"product": "database", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10191", | |
"vendor": "oracle", | |
"product": "web_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10192", | |
"vendor": "oracle", | |
"product": "istore", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-10193", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10194", | |
"vendor": "oracle", | |
"product": "integrated_lights_out_manager_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10195", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10196", | |
"vendor": "oracle", | |
"product": "outside_in_technology", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10197", | |
"vendor": "oracle", | |
"product": "hospitality_opera_5_property_services", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10198", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10199", | |
"vendor": "oracle", | |
"product": "ilearning", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10200", | |
"vendor": "oracle", | |
"product": "hospitality_e7", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10201", | |
"vendor": "oracle", | |
"product": "hospitality_e7", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10202", | |
"vendor": "oracle", | |
"product": "database", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10203", | |
"vendor": "oracle", | |
"product": "mysql_connector/net", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10204", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10205", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10206", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10207", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10208", | |
"vendor": "oracle", | |
"product": "hospitality_e7", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10209", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10210", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10211", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10212", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10213", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10214", | |
"vendor": "oracle", | |
"product": "retail_xstore_point_of_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10215", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10216", | |
"vendor": "oracle", | |
"product": "hospitality_suite8_property_interfaces", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10217", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10218", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10219", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10220", | |
"vendor": "oracle", | |
"product": "hospitality_suite8_property_interfaces", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.7, | |
"cve_id": "CVE-2017-10221", | |
"vendor": "oracle", | |
"product": "hospitality_res_3700", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10222", | |
"vendor": "oracle", | |
"product": "hospitality_materials_control", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10223", | |
"vendor": "oracle", | |
"product": "hospitality_materials_control", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10224", | |
"vendor": "oracle", | |
"product": "hospitality_inventory_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-10225", | |
"vendor": "oracle", | |
"product": "hospitality_res_3700", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10226", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10227", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10228", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_shipboard_property_management_system", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10229", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_materials_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10230", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_dining_room_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10231", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_affairwhere", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10232", | |
"vendor": "oracle", | |
"product": "hospitality_websuite8_cloud_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10233", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-10234", | |
"vendor": "oracle", | |
"product": "solaris_cluster", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10235", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10236", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10237", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10238", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10239", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10240", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10241", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10242", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10243", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10244", | |
"vendor": "oracle", | |
"product": "application_object_library", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10245", | |
"vendor": "oracle", | |
"product": "general_ledger", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10246", | |
"vendor": "oracle", | |
"product": "application_object_library", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10247", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10248", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10249", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-10250", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-10251", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.9, | |
"cve_id": "CVE-2017-10252", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10253", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10254", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_staffing_front_office", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10255", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10256", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10257", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10258", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10259", | |
"vendor": "oracle", | |
"product": "coreid_access", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-10260", | |
"vendor": "oracle", | |
"product": "integrated_lights_out_manager_firmware", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10261", | |
"vendor": "oracle", | |
"product": "database", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10262", | |
"vendor": "oracle", | |
"product": "access_manager", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10263", | |
"vendor": "oracle", | |
"product": "siebel_ui_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10264", | |
"vendor": "oracle", | |
"product": "siebel_ui_framework", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10265", | |
"vendor": "oracle", | |
"product": "integrated_lights_out_manager_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10266", | |
"vendor": "oracle", | |
"product": "tuxedo", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10267", | |
"vendor": "oracle", | |
"product": "tuxedo", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.5, | |
"cve_id": "CVE-2017-10268", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10269", | |
"vendor": "oracle", | |
"product": "tuxedo", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-10270", | |
"vendor": "oracle", | |
"product": "identity_manager_connector", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10271", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10272", | |
"vendor": "oracle", | |
"product": "tuxedo", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.7, | |
"cve_id": "CVE-2017-10273", | |
"vendor": "oracle", | |
"product": "jdeveloper", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10274", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 6.3, | |
"cve_id": "CVE-2017-10275", | |
"vendor": "oracle", | |
"product": "solaris_ak", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10276", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10277", | |
"vendor": "oracle", | |
"product": "mysql_connector/net", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10278", | |
"vendor": "oracle", | |
"product": "tuxedo", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10279", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10280", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10281", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10282", | |
"vendor": "oracle", | |
"product": "database_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10283", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10284", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10285", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10286", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10287", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_strategic_sourcing", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 1.7, | |
"cve_id": "CVE-2017-10292", | |
"vendor": "oracle", | |
"product": "database", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10293", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 1.7, | |
"cve_id": "CVE-2017-10294", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10295", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10296", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10299", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10300", | |
"vendor": "oracle", | |
"product": "siebel_customer_relationship_management_desktop", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10301", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10302", | |
"vendor": "oracle", | |
"product": "siebel_ui_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10303", | |
"vendor": "oracle", | |
"product": "interaction_center_intelligence", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10304", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_human_capital_management_human_resources", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10306", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_human_capital_management_human_resources", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10308", | |
"vendor": "oracle", | |
"product": "agile_product_lifecycle_management_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10309", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10310", | |
"vendor": "oracle", | |
"product": "hyperion_financial_reporting", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10311", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10312", | |
"vendor": "oracle", | |
"product": "hyperion_bi+", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10313", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10314", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10315", | |
"vendor": "oracle", | |
"product": "siebel_ui_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10316", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10317", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10318", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10319", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10320", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10321", | |
"vendor": "oracle", | |
"product": "database", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10322", | |
"vendor": "oracle", | |
"product": "common_applications_calendar", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10323", | |
"vendor": "oracle", | |
"product": "web_applications_desktop_integrator", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10324", | |
"vendor": "oracle", | |
"product": "e-business_suite_technology_stack", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10325", | |
"vendor": "oracle", | |
"product": "common_applications_calendar", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10326", | |
"vendor": "oracle", | |
"product": "common_applications_calendar", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10327", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10328", | |
"vendor": "oracle", | |
"product": "application_object_library", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10329", | |
"vendor": "oracle", | |
"product": "global_order_promising", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10330", | |
"vendor": "oracle", | |
"product": "common_applications", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10331", | |
"vendor": "oracle", | |
"product": "application_object_library", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10332", | |
"vendor": "oracle", | |
"product": "universal_work_queue", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10333", | |
"vendor": "oracle", | |
"product": "siebel_ui_framework", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10334", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10335", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10336", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10337", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10338", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10339", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10340", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10341", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10342", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10343", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10344", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.6, | |
"cve_id": "CVE-2017-10345", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10346", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10347", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10348", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10349", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10350", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10351", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10352", | |
"vendor": "oracle", | |
"product": "weblogic_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10353", | |
"vendor": "oracle", | |
"product": "hospitality_hotel_mobile", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10354", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_prtl_interaction_hub", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10355", | |
"vendor": "oracle", | |
"product": "jre,jdk,jrockit", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10356", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10357", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10358", | |
"vendor": "oracle", | |
"product": "hyperion_financial_reporting", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10359", | |
"vendor": "oracle", | |
"product": "hyperion_bi+", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10360", | |
"vendor": "oracle", | |
"product": "webcenter_content", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10361", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_shipboard_property_management_system", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10362", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10363", | |
"vendor": "oracle", | |
"product": "flexcube_universal_banking", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10364", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10365", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10366", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10367", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10368", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_scm_eprocurement", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-10369", | |
"vendor": "oracle", | |
"product": "virtual_directory", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10370", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10372", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10373", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10375", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10378", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10379", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10380", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10381", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10382", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10383", | |
"vendor": "oracle", | |
"product": "hospitality_guest_access", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10384", | |
"vendor": "oracle", | |
"product": "mysql", | |
"cwe": "NVD-CWE-noinfo" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10385", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10386", | |
"vendor": "oracle", | |
"product": "java_advanced_management_console", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10387", | |
"vendor": "oracle", | |
"product": "customer_relationship_management_technical_foundation", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-10388", | |
"vendor": "oracle", | |
"product": "jre,jdk", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.1, | |
"cve_id": "CVE-2017-10389", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10391", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10392", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10393", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10394", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10395", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10396", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_affairwhere", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10397", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.2, | |
"cve_id": "CVE-2017-10398", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 3.5, | |
"cve_id": "CVE-2017-10399", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_fleet_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10400", | |
"vendor": "oracle", | |
"product": "glassfish_server", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10401", | |
"vendor": "oracle", | |
"product": "hospitality_cruise_materials_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10402", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10403", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10404", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10405", | |
"vendor": "oracle", | |
"product": "hospitality_reporting_and_analytics", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10406", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10407", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10408", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10409", | |
"vendor": "oracle", | |
"product": "istore", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10410", | |
"vendor": "oracle", | |
"product": "knowledge_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10411", | |
"vendor": "oracle", | |
"product": "knowledge_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10412", | |
"vendor": "oracle", | |
"product": "knowledge_management", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10413", | |
"vendor": "oracle", | |
"product": "mobile_field_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10414", | |
"vendor": "oracle", | |
"product": "istore", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10415", | |
"vendor": "oracle", | |
"product": "isupport", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10416", | |
"vendor": "oracle", | |
"product": "advanced_outbound_telephony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10417", | |
"vendor": "oracle", | |
"product": "advanced_outbound_telephony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10418", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.6, | |
"cve_id": "CVE-2017-10419", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10420", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10421", | |
"vendor": "oracle", | |
"product": "hospitality_suite8", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10422", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_peopletools", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10423", | |
"vendor": "oracle", | |
"product": "retail_back_office", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10424", | |
"vendor": "oracle", | |
"product": "mysql_enterprise_monitor", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.5, | |
"cve_id": "CVE-2017-10425", | |
"vendor": "oracle", | |
"product": "hospitality_simphony", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10426", | |
"vendor": "oracle", | |
"product": "peoplesoft_enterprise_staffing_front_office", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10427", | |
"vendor": "oracle", | |
"product": "retail_xstore_point_of_service", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.1, | |
"cve_id": "CVE-2017-10428", | |
"vendor": "oracle", | |
"product": "vm_virtualbox", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10600", | |
"vendor": "canonical", | |
"product": "ubuntu-image", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-10601", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-10602", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-10603", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10604", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10605", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10606", | |
"vendor": "juniper", | |
"product": "trusted_platform_module_firmware", | |
"cwe": "CWE-310" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10607", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10608", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10610", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10611", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.0, | |
"cve_id": "CVE-2017-10612", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10613", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10614", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10615", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10616", | |
"vendor": "juniper", | |
"product": "contrail", | |
"cwe": "CWE-798" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10617", | |
"vendor": "juniper", | |
"product": "contrail", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10618", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10619", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.8, | |
"cve_id": "CVE-2017-10620", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10621", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-10622", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10623", | |
"vendor": "juniper", | |
"product": "junos", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.1, | |
"cve_id": "CVE-2017-10624", | |
"vendor": "juniper", | |
"product": "junos_space", | |
"cwe": "CWE-345" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "HIGH", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.6, | |
"cve_id": "CVE-2017-10661", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-10662", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-10663", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-129" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10664", | |
"vendor": "qemu", | |
"product": "qemu", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10665", | |
"vendor": "phpgrid", | |
"product": "phpgrid", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10667", | |
"vendor": "zen-cart", | |
"product": "zen_cart", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10668", | |
"vendor": "xoev", | |
"product": "osci_transport_library", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10669", | |
"vendor": "xoev", | |
"product": "osci_transport_library", | |
"cwe": "CWE-347" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10670", | |
"vendor": "xoev", | |
"product": "osci_transport_library", | |
"cwe": "CWE-611" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10671", | |
"vendor": "sthttpd_project", | |
"product": "sthttpd", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10672", | |
"vendor": "xml-libxml_project", | |
"product": "xml-libxml", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10673", | |
"vendor": "cagintranetworks", | |
"product": "getsimple_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 4.9, | |
"cve_id": "CVE-2017-10674", | |
"vendor": "antiy", | |
"product": "antivirus_engine", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10676", | |
"vendor": "d-link", | |
"product": "dir-600m_firmware", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10677", | |
"vendor": "linksys", | |
"product": "ea4500_firmware", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10678", | |
"vendor": "piwigo", | |
"product": "piwigo", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10679", | |
"vendor": "piwigo", | |
"product": "piwigo", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10680", | |
"vendor": "piwigo", | |
"product": "piwigo", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10681", | |
"vendor": "piwigo", | |
"product": "piwigo", | |
"cwe": "CWE-352" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10682", | |
"vendor": "piwigo", | |
"product": "piwigo", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10683", | |
"vendor": "mpg123_project", | |
"product": "mpg123", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10684", | |
"vendor": "gnu", | |
"product": "ncurses", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10685", | |
"vendor": "gnu", | |
"product": "ncurses", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10686", | |
"vendor": "nasm", | |
"product": "netwide_assembler", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10687", | |
"vendor": "libsass", | |
"product": "libsass", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10688", | |
"vendor": "libtiff", | |
"product": "libtiff", | |
"cwe": "CWE-20" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10689", | |
"vendor": "puppetlabs", | |
"product": "puppet,puppet_enterprise", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10690", | |
"vendor": "puppetlabs", | |
"product": "puppet,puppet_enterprise", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10699", | |
"vendor": "videolan", | |
"product": "vlc_media_player", | |
"cwe": "CWE-787" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-10700", | |
"vendor": "qnap", | |
"product": "qts", | |
"cwe": "CWE-77" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10701", | |
"vendor": "sap", | |
"product": "enterprise_portal", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10706", | |
"vendor": "antiy", | |
"product": "antivirus_engine", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10708", | |
"vendor": "apport_project", | |
"product": "apport", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.2, | |
"cve_id": "CVE-2017-10709", | |
"vendor": "google", | |
"product": "android", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10711", | |
"vendor": "simplerisk", | |
"product": "simplerisk", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.4, | |
"cve_id": "CVE-2017-10725", | |
"vendor": "winamp", | |
"product": "winamp", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10726", | |
"vendor": "winamp", | |
"product": "winamp", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10727", | |
"vendor": "winamp", | |
"product": "winamp", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10728", | |
"vendor": "winamp", | |
"product": "winamp", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10729", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10730", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10731", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10732", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10733", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10734", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10735", | |
"vendor": "irfanview", | |
"product": "irfanview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10736", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10737", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10738", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10739", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10740", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10741", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10742", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10743", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10744", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10745", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10746", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10747", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10748", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10749", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10750", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10751", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10752", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10753", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10754", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10755", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10756", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10757", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10758", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10759", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10760", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10761", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10762", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10763", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10764", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10765", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10766", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10767", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10768", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10769", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10770", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10771", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10772", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10773", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10774", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10775", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10776", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10777", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10778", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10779", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10780", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10781", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10782", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.6, | |
"cve_id": "CVE-2017-10783", | |
"vendor": "xnview", | |
"product": "xnview", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10784", | |
"vendor": "ruby-lang", | |
"product": "ruby", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10788", | |
"vendor": "dbd-mysql_project", | |
"product": "dbd-mysql", | |
"cwe": "CWE-416" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10789", | |
"vendor": "dbd-mysql_project", | |
"product": "dbd-mysql", | |
"cwe": "CWE-254" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10790", | |
"vendor": "gnu", | |
"product": "libtasn1", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10791", | |
"vendor": "gnu", | |
"product": "pspp", | |
"cwe": "CWE-190" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10792", | |
"vendor": "gnu", | |
"product": "pspp", | |
"cwe": "CWE-476" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10793", | |
"vendor": "att", | |
"product": "u-verse_firmware", | |
"cwe": "CWE-200" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10794", | |
"vendor": "graphicsmagick", | |
"product": "graphicsmagick", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10795", | |
"vendor": "intelliants", | |
"product": "subrion_cms", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 3.3, | |
"cve_id": "CVE-2017-10796", | |
"vendor": "tp-link", | |
"product": "nc250_v1_firmware", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10798", | |
"vendor": "objectplanet", | |
"product": "opinio", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10799", | |
"vendor": "graphicsmagick", | |
"product": "graphicsmagick", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10800", | |
"vendor": "graphicsmagick", | |
"product": "graphicsmagick", | |
"cwe": "CWE-400" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10801", | |
"vendor": "phpsocial", | |
"product": "phpsocial", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 8.5, | |
"cve_id": "CVE-2017-10803", | |
"vendor": "odoo", | |
"product": "odoo", | |
"cwe": "CWE-19" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10804", | |
"vendor": "odoo", | |
"product": "odoo", | |
"cwe": "CWE-306" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10805", | |
"vendor": "odoo", | |
"product": "odoo", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "LOCAL", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 2.1, | |
"cve_id": "CVE-2017-10806", | |
"vendor": "qemu", | |
"product": "qemu", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10807", | |
"vendor": "jabberd2", | |
"product": "jabberd2", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.8, | |
"cve_id": "CVE-2017-10810", | |
"vendor": "linux", | |
"product": "linux_kernel", | |
"cwe": "CWE-399" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.7, | |
"cve_id": "CVE-2017-10811", | |
"vendor": "buffalo", | |
"product": "wcr-1166ds_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10812", | |
"vendor": "nttdocomo", | |
"product": "photo_collection_pc_software", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.7, | |
"cve_id": "CVE-2017-10813", | |
"vendor": "corega", | |
"product": "wlr_300_nm_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "ADJACENT_NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 7.7, | |
"cve_id": "CVE-2017-10814", | |
"vendor": "corega", | |
"product": "wlr_300_nm_firmware", | |
"cwe": "CWE-119" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10815", | |
"vendor": "intercom", | |
"product": "malion", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10816", | |
"vendor": "intercom", | |
"product": "malion", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10817", | |
"vendor": "intercom", | |
"product": "malion", | |
"cwe": "CWE-287" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10818", | |
"vendor": "intercom", | |
"product": "malion", | |
"cwe": "CWE-798" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10819", | |
"vendor": "intercom", | |
"product": "malion", | |
"cwe": "CWE-295" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10820", | |
"vendor": "ipa", | |
"product": "ip_messenger", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10821", | |
"vendor": "enecho.meti", | |
"product": "shin_kikan_toukei_houkoku_data_nyuryokuyou_program", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10822", | |
"vendor": "enecho.meti", | |
"product": "shin_sekiyu_yunyu_chousa_houkoku_data_nyuryoku_program", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10823", | |
"vendor": "enecho.meti", | |
"product": "shin_kinkyuji_houkoku_data_nyuryoku_program", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10824", | |
"vendor": "teikoku_databank", | |
"product": "type_a", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.8, | |
"cve_id": "CVE-2017-10825", | |
"vendor": "flets-w", | |
"product": "flets_easy_setup_tool", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10826", | |
"vendor": "ntt", | |
"product": "security_kinou_mihariban", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10827", | |
"vendor": "ntt", | |
"product": "flets_azukuu_pc_automatic_backup_tool", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10828", | |
"vendor": "ntt", | |
"product": "flets_install_tool", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10829", | |
"vendor": "ntt", | |
"product": "enkaku_support_tool", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10830", | |
"vendor": "ntt", | |
"product": "security_setup_tool", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10831", | |
"vendor": "moj.go", | |
"product": "commercial_registration_electronic_authentication_software", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-10832", | |
"vendor": "nippon-antenna", | |
"product": "scr02hd_firmware", | |
"cwe": "CWE-78" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10833", | |
"vendor": "nippon-antenna", | |
"product": "scr02hd_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10834", | |
"vendor": "nippon-antenna", | |
"product": "scr02hd_firmware", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10835", | |
"vendor": "nippon-antenna", | |
"product": "scr02hd_firmware", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10836", | |
"vendor": "optim", | |
"product": "optimal_guard", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10837", | |
"vendor": "backup-guard", | |
"product": "backupguard", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10838", | |
"vendor": "seopanel", | |
"product": "seo_panel", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10839", | |
"vendor": "seopanel", | |
"product": "seo_panel", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.3, | |
"cve_id": "CVE-2017-10840", | |
"vendor": "webcalendar_project", | |
"product": "webcalendar", | |
"cwe": "CWE-79" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 4.0, | |
"cve_id": "CVE-2017-10841", | |
"vendor": "webcalendar_project", | |
"product": "webcalendar", | |
"cwe": "CWE-22" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 7.5, | |
"cve_id": "CVE-2017-10842", | |
"vendor": "basercms", | |
"product": "basercms", | |
"cwe": "CWE-89" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "NONE", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.4, | |
"cve_id": "CVE-2017-10843", | |
"vendor": "basercms", | |
"product": "basercms", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "SINGLE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "PARTIAL", | |
"availabilityImpact": "PARTIAL", | |
"baseScore": 6.5, | |
"cve_id": "CVE-2017-10844", | |
"vendor": "basercms", | |
"product": "basercms", | |
"cwe": "CWE-94" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 10.0, | |
"cve_id": "CVE-2017-10845", | |
"vendor": "nttdocomo", | |
"product": "wi-fi_station_l-02f_firmware", | |
"cwe": "CWE-264" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "LOW", | |
"authentication": "NONE", | |
"confidentialityImpact": "PARTIAL", | |
"integrityImpact": "NONE", | |
"availabilityImpact": "NONE", | |
"baseScore": 5.0, | |
"cve_id": "CVE-2017-10846", | |
"vendor": "nttdocomo", | |
"product": "wi-fi_station_l-02f_firmware", | |
"cwe": "CWE-284" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10848", | |
"vendor": "fujixerox", | |
"product": "docuworks,docuworks_viewer_light", | |
"cwe": "CWE-426" | |
}, | |
{ | |
"accessVector": "NETWORK", | |
"accessComplexity": "MEDIUM", | |
"authentication": "NONE", | |
"confidentialityImpact": "COMPLETE", | |
"integrityImpact": "COMPLETE", | |
"availabilityImpact": "COMPLETE", | |
"baseScore": 9.3, | |
"cve_id": "CVE-2017-10849", | |
"vendor": "fujixerox", | |
" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment