{"resultsPerPage":36,"startIndex":0,"totalResults":36,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-22T19:33:26.280","vulnerabilities":[{"cve":{"id":"CVE-2005-1794","sourceIdentifier":"cve@mitre.org","published":"2005-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:remote_desktop_connection:5.1.2600.2180:*:windows_xp:*:*:*:*:*","matchCriteriaId":"20DA4D39-C134-4DC3-98C2-78E38158BD19"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_terminal_services_using_rdp:5.2:*:*:*:*:*:*:*","matchCriteriaId":"DF2ED35B-BE2F-492E-8219-7C984301711C"}]}]}],"references":[{"url":"http://secunia.com/advisories/15605/","source":"cve@mitre.org"},{"url":"http://www.oxid.it/downloads/rdp-gbu.pdf","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/13818","source":"cve@mitre.org"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12441","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/15605/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.oxid.it/downloads/rdp-gbu.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/13818","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12441","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2012-0814","sourceIdentifier":"secalert@redhat.com","published":"2012-01-27T19:55:01.063","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite.  NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory."},{"lang":"es","value":"La función auth_parse_options en auth-options.c en el demonio sshd de OpenSSH antes de v5.7 muestra mensajes de depuración que contienen opciones del comando authorized_keys, lo que permite obtener información sensible a usuarios remotos autenticados mediante la lectura de estos mensajes. El problema queda demostrado con la cuenta de usuario compartida solicitada por Gitolite. NOTA: esto puede cruzar los límites de los privilegios, porque una cuenta de usuario intencionalmente no tiene acceso a una 'shell' o al sistema de archivos, y por lo tanto no tienen forma de leer un archivo authorized_keys en su propio directorio."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","versionEndIncluding":"5.6","matchCriteriaId":"607877D1-B86A-4973-A5D7-D3D0247FC272"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","matchCriteriaId":"316C8534-9CE3-456C-A04E-5D2B789FBE31"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"7BEB67BB-A442-46C2-8BC1-BBEB009AC532"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"B6E307F1-C765-409C-835C-133026A5179C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*","matchCriteriaId":"CA997F5E-29FE-454A-9006-001D732CD4B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"114134F3-BDFD-465D-8317-82F9D6EFA5A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*","matchCriteriaId":"DAB55300-F90D-45D3-88BC-5ADCEC366264"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3EC5611-31B5-4253-B99A-E81C202768A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*","matchCriteriaId":"43060323-1B51-45B4-BEB9-0E472896D8EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*","matchCriteriaId":"5441C616-D127-42D9-88AA-0FC9AA16EB03"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*","matchCriteriaId":"FE60A415-91E3-4819-A252-E86A32EC3018"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*","matchCriteriaId":"EED5E506-9D2B-4CAF-8455-B9BE7696E49C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"EE7CB94E-0479-4939-86F6-0B4BEDE2E739"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*","matchCriteriaId":"78135400-BA1A-42AA-BE17-5588442BCF11"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*","matchCriteriaId":"78F2EDC0-3189-4523-882B-9188C852F793"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*","matchCriteriaId":"CDEF5203-9D6B-4431-BF0D-C81B1E250AEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*","matchCriteriaId":"E2991C07-5486-4590-A74E-46A379DD3339"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EB9BE06-0A36-4853-ADF4-9C1A1854278A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.5.2:*:*:*:*:*:*:*","matchCriteriaId":"8FC57F38-6545-497B-B6DA-FCAF51755988"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9:*:*:*:*:*:*:*","matchCriteriaId":"EC30FD61-10DA-4C9B-BCE8-AD75DCEB40BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9.9:*:*:*:*:*:*:*","matchCriteriaId":"EC1DF4CE-E71C-4C10-9F82-B9ECDC94933F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9.9p2:*:*:*:*:*:*:*","matchCriteriaId":"80C55B73-497D-4A22-9230-A4160BF97344"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9p1:*:*:*:*:*:*:*","matchCriteriaId":"0238F009-4BBA-4E6B-9E2A-6045BA9BBE9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:2.9p2:*:*:*:*:*:*:*","matchCriteriaId":"4B235167-9554-4431-88C5-9472DD36FCDE"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*","matchCriteriaId":"580008AC-2667-4708-8F7E-D70416A460EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"E05D8E86-EC01-4589-B372-4DEB7845C81F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*","matchCriteriaId":"764AD252-CA2F-4A87-BCAA-7747E8C410E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"CFFAA075-4277-4FD8-8A5A-867EEE1BA2F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*","matchCriteriaId":"269BB9F7-55E5-4CB3-8429-C37C7132799F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*","matchCriteriaId":"C6E6F639-31A0-4026-B6D4-51BA79FB1D20"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*","matchCriteriaId":"0211BCE3-0DED-40BA-8A21-1A97B91F71C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*","matchCriteriaId":"B4EE9E4B-CABC-4EA2-9075-CC23CEB1B0A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*","matchCriteriaId":"5AD7BB30-AC79-4153-852C-1053DCF4DE53"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*","matchCriteriaId":"F48519C6-0C28-49A5-94C7-EF3AA88E2667"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*","matchCriteriaId":"9E188C66-C8F1-4C13-AAFF-7C83B2A884B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*","matchCriteriaId":"9039BE91-AF0A-41E7-8F9F-15375890E120"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*","matchCriteriaId":"08BCB2EA-DF9D-4853-805B-29FA6274E2B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*","matchCriteriaId":"0F93417F-2498-4576-9F5D-B59F77D39669"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*","matchCriteriaId":"AF3AB42C-B614-4746-99AD-E94140D91BF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*","matchCriteriaId":"458167E5-9BC2-40BE-AC8A-9761A4F19494"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*","matchCriteriaId":"3FB9B4C7-4235-4388-8E5D-E72ECCC37A7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*","matchCriteriaId":"86ACA0ED-A3D0-48A7-B06F-13709AD23B55"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*","matchCriteriaId":"0FEB9262-D05E-4610-9C79-3EDE44AC7C0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*","matchCriteriaId":"8176879B-1875-4AC9-B15A-2ABCFCD04F88"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*","matchCriteriaId":"FAA26A12-F96A-4025-BBCA-72B7A3B1E60C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*","matchCriteriaId":"A02751E9-2D38-4495-9572-8D84D71D4773"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*","matchCriteriaId":"7A36BEA2-DAE4-423C-8D85-0F6036351F98"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*","matchCriteriaId":"80DC64F6-FE28-44BA-91D1-EC2DB11B2CFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*","matchCriteriaId":"DF23EBA1-D3A9-413F-9E83-43A91492C031"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*","matchCriteriaId":"44CCF5CD-B434-4392-A79A-C1945D2AE30A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*","matchCriteriaId":"AEB456B8-9D8B-4985-858D-6A43FA5EE2E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*","matchCriteriaId":"2BD4E0F6-4EEA-4EC7-83E7-FC6F7D2E7A3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*","matchCriteriaId":"C35F4ABE-1B0C-4195-8F99-BF993A17882B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*","matchCriteriaId":"ADC7352D-2916-47F7-A256-F897D763DC9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*","matchCriteriaId":"AEC3FC36-B246-4DCB-8984-228525D9A356"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*","matchCriteriaId":"BC861000-37D8-4B0F-BFA0-57E9BE125B56"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E003AB3C-8DF3-4AE8-82A3-984F30E5599B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*","matchCriteriaId":"5EBE75FE-DDE2-43BA-80EF-15A6698EABC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*","matchCriteriaId":"1FF67D77-02AC-4807-984D-C5AE9799F051"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*","matchCriteriaId":"683B26F0-5EA2-455A-8948-27C100BBA3AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*","matchCriteriaId":"E5A75B23-2DD7-4EB2-BEAA-049FF4E51A14"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*","matchCriteriaId":"7279E1EC-DEBC-4ACC-925D-06A7697C162F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*","matchCriteriaId":"7910598E-BEC1-4644-9DE4-D8BE505A4F9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*","matchCriteriaId":"FB416D0C-6C86-450F-8917-D4B1BD82AB1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*","matchCriteriaId":"3640CCC9-EC4A-44A4-B747-7BAAAD3460C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*","matchCriteriaId":"B2DD362E-9EA9-4E88-9A94-D7B471EB1FD4"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*","matchCriteriaId":"E3094069-AC2E-43BD-8094-D48E2526DECC"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*","matchCriteriaId":"9B72CFB3-39C7-469C-AA59-69F5B8993BF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*","matchCriteriaId":"2A7154C4-8325-4495-92B1-B7897CD7303E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*","matchCriteriaId":"99BF4471-763B-485A-ABD5-C68AD0A14058"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*","matchCriteriaId":"40B1B209-53B8-48DC-AFFC-BD69D5978A0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*","matchCriteriaId":"7212E982-76F2-496C-9F08-EC4137F20804"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*","matchCriteriaId":"52D13E08-7B08-44AA-9017-3EE3F6301E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*","matchCriteriaId":"2FBC7FF1-01EE-40A1-8735-14360A371803"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*","matchCriteriaId":"987527F8-8A42-4729-A329-4D2AC8AFD6E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*","matchCriteriaId":"93910448-8D6F-4F7E-9C7F-959754ABA50D"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*","matchCriteriaId":"3356FDFD-BEA5-45A5-A36B-D1153AFE6C23"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*","matchCriteriaId":"9394B8AD-AB22-4955-8774-C6BA2B56A260"}]}]}],"references":[{"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445","source":"secalert@redhat.com"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673","source":"secalert@redhat.com"},{"url":"http://openwall.com/lists/oss-security/2012/01/26/15","source":"secalert@redhat.com"},{"url":"http://openwall.com/lists/oss-security/2012/01/26/16","source":"secalert@redhat.com"},{"url":"http://openwall.com/lists/oss-security/2012/01/27/1","source":"secalert@redhat.com"},{"url":"http://openwall.com/lists/oss-security/2012/01/27/4","source":"secalert@redhat.com"},{"url":"http://osvdb.org/78706","source":"secalert@redhat.com"},{"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c","source":"secalert@redhat.com"},{"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3Br2=1.54","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/bid/51702","source":"secalert@redhat.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72756","source":"secalert@redhat.com"},{"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://openwall.com/lists/oss-security/2012/01/26/15","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://openwall.com/lists/oss-security/2012/01/26/16","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://openwall.com/lists/oss-security/2012/01/27/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://openwall.com/lists/oss-security/2012/01/27/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://osvdb.org/78706","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/auth-options.c.diff?r1=1.53%3Br2=1.54","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/51702","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72756","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2013-2566","sourceIdentifier":"cve@mitre.org","published":"2013-03-15T21:55:01.047","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext."},{"lang":"es","value":"El algoritmo RC4, tal como se usa en el protocolo TLS y protocolo SSL, tiene muchos \"single-byte biases\", lo que hace que sea más fácil para atacantes remotos realizar ataques de recuperación de texto claro a través de análisis estadístico de texto cifrado en un gran número de sesiones que utilizan el mismo texto claro."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-326"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.9.1","matchCriteriaId":"9750DF83-22E8-4299-BC95-33217B968211"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*","matchCriteriaId":"911FBD5E-213D-482F-81A9-C3B8CE7D903A"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*","matchCriteriaId":"EBD2676F-EE9D-4462-ABA5-C11CE726849C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"6505AE29-5091-4C72-AF6B-932DEF53A8D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"4EC475C1-A339-4C49-B6BA-A0E4D6FDF5DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"38A45A86-3B7E-4245-B717-2A6E868BE6BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.2.11","matchCriteriaId":"24EDBB8B-1AFB-498D-B78C-7BC72B8C1085"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndIncluding":"4.0.4","matchCriteriaId":"F3024389-3D4A-4E19-BE42-DAF9EA51D471"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp_1121","matchCriteriaId":"9DBE3B60-DED8-4F47-A60F-410ECB873BAE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*","matchCriteriaId":"AB54B753-F066-4387-B0C3-43E647A42EBE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp_1121","matchCriteriaId":"5BBD38A2-1B17-4B28-9FE1-6D62A6337C12"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*","matchCriteriaId":"1846C0CA-AE13-435F-BF91-EEE0CC311DD5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp_1121","matchCriteriaId":"5884F45B-F822-46B9-A0DC-6B59A3C3E7E0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*","matchCriteriaId":"C2EDCD99-9677-45A7-9221-3A6A41917A7C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp_1121","matchCriteriaId":"9ED7A13F-9510-4FA0-96A6-D2D34D49545F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*","matchCriteriaId":"9581ABD4-5ED6-4EC5-8A0B-1D7A449C10D5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp_1121","matchCriteriaId":"0C4C1EC1-19BE-4E1E-8F56-47A83AD0410D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*","matchCriteriaId":"0A2CEAD6-9F8C-411C-9107-BA858CB8A31B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp2280","matchCriteriaId":"0AB4298E-79C7-418D-B843-8EBDC6682342"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*","matchCriteriaId":"983D27DE-BC89-454E-AE47-95A26A3651E2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp2280","matchCriteriaId":"6F45C5EA-556E-47A5-81FB-F6A85342FAC4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*","matchCriteriaId":"5825AEE1-B668-40BD-86A9-2799430C742C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"xcp","versionEndExcluding":"xcp2280","matchCriteriaId":"04F93A4F-97A9-4B32-A460-86B5EBCEB263"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*","matchCriteriaId":"3DA2D526-BDCF-4A65-914A-B3BA3A0CD613"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","matchCriteriaId":"8D305F7A-D159-4716-AB26-5E38BB5CD991"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","matchCriteriaId":"E2076871-2E80-4605-A470-A41C1A8EC7EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","matchCriteriaId":"EFAA48D9-BEB4-4E49-AD50-325C262D46D9"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*","matchCriteriaId":"7F61F047-129C-41A6-8A27-FFCBB8563E91"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"17.0.11","matchCriteriaId":"74242CE4-EB52-4765-A5E9-94C808EFC997"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"25.0.1","matchCriteriaId":"7E547DD8-D3E3-4CA9-BE68-313A476A4B80"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionStartIncluding":"24.1.0","versionEndExcluding":"24.1.1","matchCriteriaId":"F7236D2E-3A8D-48DF-817E-0B536EF66891"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","versionEndExcluding":"2.22.1","matchCriteriaId":"BAA54653-EDA1-4B8E-B328-51B0D77D2027"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"24.1.1","matchCriteriaId":"FBBD7730-3DCA-4448-A912-1B6AE4658355"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*","versionEndExcluding":"17.0.11","matchCriteriaId":"19BF5469-96AF-43B2-B875-C5241BD406F2"}]}]}],"references":[{"url":"http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://cr.yp.to/talks/2013.03.12/slides.pdf","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=143039468003789&w=2","source":"cve@mitre.org","tags":["Issue Tracking","Third Party Advisory"]},{"url":"http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201406-19.xml","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.isg.rhul.ac.uk/tls/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.mozilla.org/security/announce/2013/mfsa2013-103.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.opera.com/docs/changelogs/unified/1215/","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.opera.com/security/advisory/1046","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/58796","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.ubuntu.com/usn/USN-2031-1","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.ubuntu.com/usn/USN-2032-1","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/201504-01","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://cr.yp.to/talks/2013.03.12/slides.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=143039468003789&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"http://my.opera.com/securitygroup/blog/2013/03/20/on-the-precariousness-of-rc4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201406-19.xml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.isg.rhul.ac.uk/tls/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.mozilla.org/security/announce/2013/mfsa2013-103.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.opera.com/docs/changelogs/unified/1215/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.opera.com/security/advisory/1046","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/58796","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.ubuntu.com/usn/USN-2031-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.ubuntu.com/usn/USN-2032-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.gentoo.org/glsa/201504-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2013-1609","sourceIdentifier":"secure@symantec.com","published":"2013-03-26T14:07:27.770","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple unquoted Windows search path vulnerabilities in the (1) File Collector and (2) File PlaceHolder services in Symantec Enterprise Vault (EV) for File System Archiving before 9.0.4 and 10.x before 10.0.1 allow local users to gain privileges via a Trojan horse program."},{"lang":"es","value":"Múltiples vulnerabilidades de ruta no confiable en la búsqueda no literal de Windows en los servicios (1) File Collector y (2) File PlaceHolder en Symantec Enterprise Vault (EV) para File System Archiving anterior a v9.0.4 y v10.x anterior a v10.0.1, permite a usuarios locales obtener privilegios a través de un programa tipo troyano."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:C/I:C/A:C","baseScore":6.8,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.1,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_vault_for_file_system_archiving:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0.3","matchCriteriaId":"36C5BBCC-B0C1-4B90-B2DE-5457419CA88A"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enterprise_vault_for_file_system_archiving:10.0.0:*:*:*:*:*:*:*","matchCriteriaId":"E7A76C69-5D78-4287-8E88-D633513CE047"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/58617","source":"secure@symantec.com"},{"url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130321_00","source":"secure@symantec.com"},{"url":"http://www.securityfocus.com/bid/58617","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20130321_00","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2023-1863","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-04-14T09:15:06.967","lastModified":"2024-11-21T07:40:02.687","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eskom:el_terminali_\\(su_okuma\\)_uygulamalarimiz:*:*:*:*:*:*:*:*","versionEndExcluding":"23.04.06","matchCriteriaId":"315F7D6B-55E6-4ACD-928D-D95F97F8322C"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0225","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0225","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-1873","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-04-17T14:15:07.627","lastModified":"2024-11-21T07:40:03.840","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Faturamatik Bircard allows SQL Injection.This issue affects Bircard: before 23.04.05.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:faturamatik:bircard:*:*:*:*:*:*:*:*","versionEndExcluding":"23.04.05","matchCriteriaId":"1837F935-5501-4225-B7D1-59C39DC0D0A4"}]}]}],"references":[{"url":"https://www.faturamatik.com.tr/tr/hizmetlerimiz/bircard","source":"iletisim@usom.gov.tr","tags":["Product"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0231","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.faturamatik.com.tr/tr/hizmetlerimiz/bircard","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0231","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2712","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-20T10:15:09.203","lastModified":"2024-11-21T07:59:08.977","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unrestricted Upload of File with Dangerous Type vulnerability  in \"Rental Module\" developed by third-party for Ideasoft's E-commerce Platform allows Command Injection, Using Malicious Files, Upload a Web Shell to a Web Server.This issue affects Rental Module: before 23.05.15.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rental_module_project:rental_module:*:*:*:*:*:*:*:*","versionEndExcluding":"23.05.15","matchCriteriaId":"00F83330-FE72-4710-AFCA-2C6158D27EAB"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0276","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0276","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2713","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-20T10:15:09.583","lastModified":"2024-11-21T07:59:09.097","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authorization Bypass Through User-Controlled Key vulnerability  in \"Rental Module\" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This issue affects Rental Module: before 23.05.15.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rental_module_project:rental_module:*:*:*:*:*:*:*:*","versionEndExcluding":"23.05.15","matchCriteriaId":"00F83330-FE72-4710-AFCA-2C6158D27EAB"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0276","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0276","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2702","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-23T20:15:09.730","lastModified":"2024-11-21T07:59:07.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: before 23.07.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:finexmedia:competition_management_system:*:*:*:*:*:*:*:*","versionEndExcluding":"23.07","matchCriteriaId":"73D09461-53AD-41B1-A0E9-EF403A363624"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0283","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0283","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2703","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-23T20:15:09.817","lastModified":"2024-11-21T07:59:07.153","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Finex Media Competition Management System allows Retrieve Embedded Sensitive Data, Collect Data as Provided by Users.This issue affects Competition Management System: before 23.07.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-359"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-668"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:finexmedia:competition_management_system:*:*:*:*:*:*:*:*","versionEndExcluding":"23.07","matchCriteriaId":"73D09461-53AD-41B1-A0E9-EF403A363624"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0283","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0283","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2750","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-24T12:15:09.337","lastModified":"2024-11-21T07:59:13.250","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cityboss E-municipality allows SQL Injection.This issue affects E-municipality: before 6.05.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cityboss:e-municipality:*:*:*:*:*:*:*:*","versionEndExcluding":"6.05","matchCriteriaId":"CF42324E-E29C-43D7-88EF-6D7BD6AF461F"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0286","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0286","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2065","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-24T13:15:09.457","lastModified":"2024-11-21T07:57:52.227","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authorization Bypass Through User-Controlled Key vulnerability in Armoli Technology Cargo Tracking System allows Authentication Abuse, Authentication Bypass.This issue affects Cargo Tracking System: before 3558f28 .\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:armoli:cargo_tracking_system:*:*:*:*:*:*:*:*","versionEndExcluding":"3558f28","matchCriteriaId":"8C5436C4-2E2A-40FB-BD7B-4CF24FE6AD78"}]}]}],"references":[{"url":"https://https://www.usom.gov.tr/bildirim/tr-23-0287","source":"iletisim@usom.gov.tr","tags":["Broken Link"]},{"url":"https://https://www.usom.gov.tr/bildirim/tr-23-0287","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}},{"cve":{"id":"CVE-2023-2045","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-24T14:15:09.397","lastModified":"2024-11-21T07:57:49.650","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ipekyolu Software Auto Damage Tracking Software allows SQL Injection.This issue affects Auto Damage Tracking Software: before 4.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipekyolunet:software_auto_damage_tracking_software:*:*:*:*:*:*:*:*","versionEndExcluding":"4","matchCriteriaId":"3CD27BDA-41C7-4E17-8C63-029E5C4B377B"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0289","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0289","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2064","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-24T14:15:09.473","lastModified":"2024-11-21T07:57:52.120","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Minova Technology eTrace allows SQL Injection.This issue affects eTrace: before 23.05.20.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:minovateknoloji:etrace:*:*:*:*:*:*:*:*","versionEndExcluding":"23.05.20","matchCriteriaId":"52A89CF3-A6D3-41FA-832D-3C4B94145079"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0288","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0288","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2882","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T09:15:12.010","lastModified":"2024-11-21T07:59:29.350","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Generation of Incorrect Security Tokens vulnerability in CBOT Chatbot allows Token Impersonation, Privilege Abuse.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-1270"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.4","matchCriteriaId":"CD69E8DE-2EB4-407E-A483-2D974E33EE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.7","matchCriteriaId":"4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2883","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T09:15:12.093","lastModified":"2024-11-21T07:59:29.487","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authorization Bypass Through User-Controlled Key vulnerability in CBOT Chatbot allows Authentication Abuse, Authentication Bypass.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.4","matchCriteriaId":"CD69E8DE-2EB4-407E-A483-2D974E33EE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.7","matchCriteriaId":"4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2884","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T09:15:12.163","lastModified":"2024-11-21T07:59:29.610","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-330"},{"lang":"en","value":"CWE-338"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.4","matchCriteriaId":"CD69E8DE-2EB4-407E-A483-2D974E33EE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.7","matchCriteriaId":"4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2885","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T09:15:12.237","lastModified":"2024-11-21T07:59:29.737","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability in CBOT Chatbot allows Adversary in the Middle (AiTM).This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-924"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-924"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.4","matchCriteriaId":"CD69E8DE-2EB4-407E-A483-2D974E33EE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.7","matchCriteriaId":"4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2886","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T09:15:12.303","lastModified":"2024-11-21T07:59:29.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Missing Origin Validation in WebSockets vulnerability in CBOT Chatbot allows Content Spoofing Via Application API Manipulation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-1385"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.4","matchCriteriaId":"CD69E8DE-2EB4-407E-A483-2D974E33EE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.7","matchCriteriaId":"4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2887","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T09:15:12.377","lastModified":"2024-11-21T07:59:30.030","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authentication Bypass by Spoofing vulnerability in CBOT Chatbot allows Authentication Bypass.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-290"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_core:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.4","matchCriteriaId":"CD69E8DE-2EB4-407E-A483-2D974E33EE13"},{"vulnerable":true,"criteria":"cpe:2.3:a:cbot:cbot_panel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.0.3.7","matchCriteriaId":"4D6A686E-8F9D-4A23-941A-4C6C2FCDEA60"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2851","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-05-25T14:15:10.557","lastModified":"2024-11-21T07:59:25.183","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"iletisim@usom.gov.tr","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AGT Tech Ceppatron allows Command Line Execution through SQL Injection, SQL Injection.This issue affects all versions of the sofware also EOS when CVE-ID assigned.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:agtteknik:ceppatron:-:*:*:*:*:*:*:*","matchCriteriaId":"5C6AD692-9F59-4038-8542-2D041ACDB019"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0294","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0294","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2907","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-06-19T13:15:09.580","lastModified":"2024-11-21T07:59:32.600","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Marksoft allows SQL Injection.This issue affects Marksoft: through Mobile:v.7.1.7 ; Login:1.4 ; API:20230605.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:marksoft:marksoft:*:*:*:*:mobile:*:*:*","versionEndIncluding":"7.1.7","matchCriteriaId":"A44160CC-6EE6-424D-882A-015CD6E12BE5"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0363","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0363","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2046","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-07-10T16:15:50.987","lastModified":"2024-11-21T07:57:49.773","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yontem Informatics Vehicle Tracking System allows SQL Injection.This issue affects Vehicle Tracking System: before 8.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yontemizleme:vehicle_tracking_system:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0","matchCriteriaId":"D8374690-2750-40F7-A85C-C5D1C00334D7"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0389","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0389","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2852","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-07-10T16:15:51.557","lastModified":"2024-11-21T07:59:25.320","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Softmed SelfPatron allows SQL Injection.This issue affects SelfPatron : before 2.0.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:softmedyazilim:selfpatron:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0","matchCriteriaId":"E8527311-80D1-4E06-929E-D029AE1AC2A0"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0388","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0388","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2853","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-07-10T16:15:51.633","lastModified":"2024-11-21T07:59:25.447","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Softmed SelfPatron allows Reflected XSS.This issue affects SelfPatron : before 2.0.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:softmedyazilim:selfpatron:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0","matchCriteriaId":"E8527311-80D1-4E06-929E-D029AE1AC2A0"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0388","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0388","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2957","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-07-13T08:15:10.603","lastModified":"2024-11-21T07:59:38.720","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Lisa Software Florist Site allows SQL Injection.This issue affects Florist Site: before 3.0.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lisayazilim:florist_site:*:*:*:*:*:*:*:*","versionEndExcluding":"3.0","matchCriteriaId":"F5A208EE-A643-4395-B0D7-3F76C7B7C17E"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0403","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0403","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2958","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-07-17T15:15:09.610","lastModified":"2024-11-21T07:59:38.843","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.\n\n"}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:orjinyazilim:ats_pro:*:*:*:*:*:*:*:*","versionEndExcluding":"20230714","matchCriteriaId":"A69F0298-13A0-4145-9C86-00C68B70E36E"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0410","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0410","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2023-2889","sourceIdentifier":"iletisim@usom.gov.tr","published":"2023-11-22T14:15:10.310","lastModified":"2024-11-21T07:59:30.303","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veon Computer Service Tracking Software allows SQL Injection.This issue affects Service Tracking Software: before crm 2.0.\n\n"},{"lang":"es","value":"La neutralización inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyección SQL') en Veon Computer Service Tracking Software permite la inyección SQL. Este problema afecta Service Tracking Software: hasta 20231122. NOTA: Se contactó primeramente al proveedor sobre esta divulgación, pero no respondió de ninguna manera."}],"metrics":{"cvssMetricV31":[{"source":"iletisim@usom.gov.tr","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"iletisim@usom.gov.tr","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:veom:service_tracking:*:*:*:*:*:*:*:*","versionEndIncluding":"20231122","matchCriteriaId":"3828D333-CC9C-4BA5-8634-BC1523FD5C34"}]}]}],"references":[{"url":"https://www.usom.gov.tr/bildirim/tr-23-0653","source":"iletisim@usom.gov.tr","tags":["Third Party Advisory"]},{"url":"https://www.usom.gov.tr/bildirim/tr-23-0653","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-2025-34291","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-12-05T23:15:47.433","lastModified":"2026-05-21T20:16:13.520","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.4,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"cisaExploitAdd":"2026-05-21","cisaActionDue":"2026-06-04","cisaRequiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Langflow Origin Validation Error Vulnerability","weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*","versionEndIncluding":"1.6.9","matchCriteriaId":"1D74DC53-9772-4172-822E-3E29E5A4DDC9"}]}]}],"references":[{"url":"https://github.com/langflow-ai/langflow","source":"disclosure@vulncheck.com","tags":["Product"]},{"url":"https://www.obsidiansecurity.com/blog/cve-2025-34291-critical-account-takeover-and-rce-vulnerability-in-the-langflow-ai-agent-workflow-platform","source":"disclosure@vulncheck.com","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://www.vulncheck.com/advisories/langflow-cors-misconfiguration-to-token-hijack-and-rce","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-34291","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://www.crowdsec.net/vulntracking-report/cve-2025-34291","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}},{"cve":{"id":"CVE-2026-33017","sourceIdentifier":"security-advisories@github.com","published":"2026-03-20T05:16:15.550","lastModified":"2026-05-21T21:16:31.950","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0."},{"lang":"es","value":"Langflow es una herramienta para construir y desplegar agentes y flujos de trabajo impulsados por IA. En versiones anteriores a la 1.9.0, el endpoint POST /api/v1/build_public_tmp/{flow_id}/flow permite construir flujos públicos sin requerir autenticación. Cuando se suministra el parámetro opcional data, el endpoint utiliza datos de flujo controlados por el atacante (que contienen código Python arbitrario en las definiciones de nodos) en lugar de los datos de flujo almacenados en la base de datos. Este código se pasa a exec() sin ningún sandboxing, lo que resulta en una ejecución remota de código no autenticada. Esto es distinto de CVE-2025-3248, que corrigió /api/v1/validate/code añadiendo autenticación. El endpoint build_public_tmp está diseñado para no requerir autenticación (para flujos públicos) pero acepta incorrectamente datos de flujo suministrados por el atacante que contienen código ejecutable arbitrario. Este problema ha sido solucionado en la versión 1.9.0."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"LOW","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"cisaExploitAdd":"2026-03-25","cisaActionDue":"2026-04-08","cisaRequiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Langflow Code Injection Vulnerability","weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"},{"lang":"en","value":"CWE-95"},{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.2","matchCriteriaId":"B38E7511-B77D-4E5F-B33A-458EE5770358"}]}]}],"references":[{"url":"https://github.com/advisories/GHSA-rvqx-wpfh-mfx7","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/langflow-ai/langflow/commit/73b6612e3ef25fdae0a752d75b0fabd47328d4f0","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://github.com/langflow-ai/langflow/releases/tag/1.8.2","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Release Notes"]},{"url":"https://medium.com/@aviral23/cve-2026-33017-how-i-found-an-unauthenticated-rce-in-langflow-by-reading-the-code-they-already-dc96cdce5896","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33017","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]},{"url":"https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Press/Media Coverage"]}]}},{"cve":{"id":"CVE-2026-31433","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-04-22T09:16:21.573","lastModified":"2026-04-27T14:16:38.190","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix potencial OOB in get_file_all_info() for compound requests\n\nWhen a compound request consists of QUERY_DIRECTORY + QUERY_INFO\n(FILE_ALL_INFORMATION) and the first command consumes nearly the entire\nmax_trans_size, get_file_all_info() would blindly call smbConvertToUTF16()\nwith PATH_MAX, causing out-of-bounds write beyond the response buffer.\nIn get_file_all_info(), there was a missing validation check for\nthe client-provided OutputBufferLength before copying the filename into\nFileName field of the smb2_file_all_info structure.\nIf the filename length exceeds the available buffer space, it could lead to\npotential buffer overflows or memory corruption during smbConvertToUTF16\nconversion. This calculating the actual free buffer size using\nsmb2_calc_max_out_buf_len() and returning -EINVAL if the buffer is\ninsufficient and updating smbConvertToUTF16 to use the actual filename\nlength (clamped by PATH_MAX) to ensure a safe copy operation."}],"metrics":{"cvssMetricV31":[{"source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"references":[{"url":"https://git.kernel.org/stable/c/358cdaa1f7fbf2712cb4c5f6b59cb9a5c673c5fe","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/3a852f9d1c981fb14f6bf4e24999e0ea8088a7d7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/4cca3eff2099b18672934a39cee70aed835d652c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/7aec5a769d2356cbf344d85bcfd36de592ac96a5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9d7032851d6f5adbe2739601ca456c0ad3b422f0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/b0cd9725fe2bcc9f37d096b132318a9060373f5d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/beef2634f81f1c086208191f7228bce1d366493d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}},{"cve":{"id":"CVE-2026-43058","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-05-02T07:16:20.830","lastModified":"2026-05-06T13:08:07.970","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: fix pass-by-value structs causing MSAN warnings\n\nvidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their\nargument structs by value, causing MSAN to report uninit-value warnings.\nWhile only vidtv_ts_null_write_into() has triggered a report so far,\nboth functions share the same issue.\n\nFix by passing both structs by const pointer instead, avoiding the\nstack copy of the struct along with its MSAN shadow and origin metadata.\nThe functions do not modify the structs, which is enforced by the const\nqualifier."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/1b2820c8a9887981634020db19f1a2425558b88e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/57b01d945ed68cebe486d495dadc4901a96d3aaa","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/5f8e73bde67e931468bc2a1860d78d72f0c6ba41","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/be57e52e27c7cbfb400a8f255e475cbcff242baa","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}},{"cve":{"id":"CVE-2026-43059","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-05-05T16:16:14.927","lastModified":"2026-05-06T13:08:07.970","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix list corruption and UAF in command complete handlers\n\nCommit 302a1f674c00 (\"Bluetooth: MGMT: Fix possible UAFs\") introduced\nmgmt_pending_valid(), which not only validates the pending command but\nalso unlinks it from the pending list if it is valid. This change in\nsemantics requires updates to several completion handlers to avoid list\ncorruption and memory safety issues.\n\nThis patch addresses two left-over issues from the aforementioned rework:\n\n1. In mgmt_add_adv_patterns_monitor_complete(), mgmt_pending_remove()\nis replaced with mgmt_pending_free() in the success path. Since\nmgmt_pending_valid() already unlinks the command at the beginning of\nthe function, calling mgmt_pending_remove() leads to a double list_del()\nand subsequent list corruption/kernel panic.\n\n2. In set_mesh_complete(), the use of mgmt_pending_foreach() in the error\npath is removed. Since the current command is already unlinked by\nmgmt_pending_valid(), this foreach loop would incorrectly target other\npending mesh commands, potentially freeing them while they are still being\nprocessed concurrently (leading to UAFs). The redundant mgmt_cmd_status()\nis also simplified to use cmd->opcode directly."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/02023ff760cc104a5d86a82ef5b8dd89098ad78d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/17f89341cb4281d1da0e2fb0de5406ab7c4e25ef","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/695b45b2262fcb5e71bed1175aad59c72f92aa78","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/b5c5e96f3b0a5003c3ff98ebb33e59afec51dd77","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}},{"cve":{"id":"CVE-2026-43060","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-05-05T16:16:15.050","lastModified":"2026-05-08T13:16:37.143","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: drop pending enqueued packets on removal\n\nPackets sitting in nfqueue might hold a reference to:\n\n- templates that specify the conntrack zone, because a percpu area is\n  used and module removal is possible.\n- conntrack timeout policies and helper, where object removal leave\n  a stale reference.\n\nSince these objects can just go away, drop enqueued packets to avoid\nstale reference to them.\n\nIf there is a need for finer grain removal, this logic can be revisited\nto make selective packet drop upon dependencies."}],"metrics":{"cvssMetricV31":[{"source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"references":[{"url":"https://git.kernel.org/stable/c/36eae0956f659e48d5366d9b083d9417f3263ddc","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/3da0b946835f33bf36b459ead764c61a761e689b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/6802ff8beceb9c4254318e81c1395720438f2cc2","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/77da55dee67720e2b8d2db49a53334e6c017ee7b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8a64e76933672b08bd85b63086f33432070fd729","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/ab50302190b303f847c4eba0e31a01a56dec596e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/e68a8db3a0546482b34e9ca5ca886bcf73eb37bb","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f29a055e4f593e577805b41228b142b58f48df1b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}},{"cve":{"id":"CVE-2026-34926","sourceIdentifier":"security@trendmicro.com","published":"2026-05-21T14:16:45.213","lastModified":"2026-05-21T20:16:14.027","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations.\n\n\r\nThis vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability."}],"metrics":{"cvssMetricV31":[{"source":"security@trendmicro.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.8,"impactScore":5.3}]},"cisaExploitAdd":"2026-05-21","cisaActionDue":"2026-06-04","cisaRequiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability","weaknesses":[{"source":"security@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-23"}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU90583059/","source":"security@trendmicro.com"},{"url":"https://success.trendmicro.com/en-US/solution/KA-0023430","source":"security@trendmicro.com"},{"url":"https://success.trendmicro.com/ja-JP/solution/KA-0022974","source":"security@trendmicro.com"},{"url":"https://www.jpcert.or.jp/english/at/2026/at260014.html","source":"security@trendmicro.com"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-34926","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}},{"cve":{"id":"CVE-2026-48207","sourceIdentifier":"security@apache.org","published":"2026-05-21T17:16:21.857","lastModified":"2026-05-21T19:16:53.700","vulnStatus":"Undergoing Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deserializes attacker-controlled data using PyFory Python-native mode with strict mode disabled and relies on DeserializationPolicy to restrict unsafe classes, functions, or module attributes.\n\nThis issue affects Apache Fory: from before 1.0.0.\n\nMitigation: Users of Apache Fory are recommended to upgrade to version 1.0.0 or later, which enforces DeserializationPolicy validation for the affected ReduceSerializer paths and thus fixes this issue."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"references":[{"url":"https://fory.apache.org/security/#cve-2026-48207-pyfory-reduceserializer-deserializationpolicy-bypass","source":"security@apache.org"},{"url":"http://www.openwall.com/lists/oss-security/2026/05/21/10","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}