Skip to content

Commit c67cb21

Browse files
committed
Auto-Update: 2026-02-27T05:00:11.504044+00:00
1 parent 052910d commit c67cb21

File tree

33 files changed

+2637
-215
lines changed

33 files changed

+2637
-215
lines changed

CVE-2021/CVE-2021-477xx/CVE-2021-47779.json

Lines changed: 58 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2021-47779",
33
"sourceIdentifier": "disclosure@vulncheck.com",
44
"published": "2026-01-16T00:16:20.940",
5-
"lastModified": "2026-01-16T15:55:12.257",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2026-02-27T03:52:46.580",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -59,7 +59,7 @@
5959
"cvssMetricV31": [
6060
{
6161
"source": "disclosure@vulncheck.com",
62-
"type": "Primary",
62+
"type": "Secondary",
6363
"cvssData": {
6464
"version": "3.1",
6565
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@@ -76,6 +76,26 @@
7676
},
7777
"exploitabilityScore": 3.9,
7878
"impactScore": 2.7
79+
},
80+
{
81+
"source": "nvd@nist.gov",
82+
"type": "Primary",
83+
"cvssData": {
84+
"version": "3.1",
85+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
86+
"baseScore": 5.4,
87+
"baseSeverity": "MEDIUM",
88+
"attackVector": "NETWORK",
89+
"attackComplexity": "LOW",
90+
"privilegesRequired": "LOW",
91+
"userInteraction": "REQUIRED",
92+
"scope": "CHANGED",
93+
"confidentialityImpact": "LOW",
94+
"integrityImpact": "LOW",
95+
"availabilityImpact": "NONE"
96+
},
97+
"exploitabilityScore": 2.3,
98+
"impactScore": 2.7
7999
}
80100
]
81101
},
@@ -91,22 +111,53 @@
91111
]
92112
}
93113
],
114+
"configurations": [
115+
{
116+
"nodes": [
117+
{
118+
"operator": "OR",
119+
"negate": false,
120+
"cpeMatch": [
121+
{
122+
"vulnerable": true,
123+
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:14.0.2:*:*:*:*:*:*:*",
124+
"matchCriteriaId": "8A910A5E-5E75-4812-AA92-4F2D42531799"
125+
}
126+
]
127+
}
128+
]
129+
}
130+
],
94131
"references": [
95132
{
96133
"url": "https://github.com/Dolibarr",
97-
"source": "disclosure@vulncheck.com"
134+
"source": "disclosure@vulncheck.com",
135+
"tags": [
136+
"Product"
137+
]
98138
},
99139
{
100140
"url": "https://www.dolibarr.org/",
101-
"source": "disclosure@vulncheck.com"
141+
"source": "disclosure@vulncheck.com",
142+
"tags": [
143+
"Product"
144+
]
102145
},
103146
{
104147
"url": "https://www.exploit-db.com/exploits/50432",
105-
"source": "disclosure@vulncheck.com"
148+
"source": "disclosure@vulncheck.com",
149+
"tags": [
150+
"Exploit",
151+
"Third Party Advisory",
152+
"VDB Entry"
153+
]
106154
},
107155
{
108156
"url": "https://www.vulncheck.com/advisories/dolibarr-erp-crm-stored-cross-site-scripting-xss-privilege-escalation",
109-
"source": "disclosure@vulncheck.com"
157+
"source": "disclosure@vulncheck.com",
158+
"tags": [
159+
"Third Party Advisory"
160+
]
110161
}
111162
]
112163
}

CVE-2024/CVE-2024-341xx/CVE-2024-34193.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2024-34193",
33
"sourceIdentifier": "cve@mitre.org",
44
"published": "2024-05-20T18:15:10.400",
5-
"lastModified": "2024-11-21T09:18:14.267",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2026-02-27T03:37:07.987",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -51,14 +51,39 @@
5151
]
5252
}
5353
],
54+
"configurations": [
55+
{
56+
"nodes": [
57+
{
58+
"operator": "OR",
59+
"negate": false,
60+
"cpeMatch": [
61+
{
62+
"vulnerable": true,
63+
"criteria": "cpe:2.3:a:lkw199711:smanga:3.2.7:*:*:*:*:*:*:*",
64+
"matchCriteriaId": "D40D2178-C564-43D8-B199-0AF350636797"
65+
}
66+
]
67+
}
68+
]
69+
}
70+
],
5471
"references": [
5572
{
5673
"url": "https://github.com/vulreport3r/cve-reports/blob/main/Smanga_has_an_arbitrary_file_read_vulnerability/report.md",
57-
"source": "cve@mitre.org"
74+
"source": "cve@mitre.org",
75+
"tags": [
76+
"Exploit",
77+
"Third Party Advisory"
78+
]
5879
},
5980
{
6081
"url": "https://github.com/vulreport3r/cve-reports/blob/main/Smanga_has_an_arbitrary_file_read_vulnerability/report.md",
61-
"source": "af854a3a-2127-422b-91ae-364da2661108"
82+
"source": "af854a3a-2127-422b-91ae-364da2661108",
83+
"tags": [
84+
"Exploit",
85+
"Third Party Advisory"
86+
]
6287
}
6388
]
6489
}

CVE-2025/CVE-2025-142xx/CVE-2025-14262.json

Lines changed: 46 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2025-14262",
33
"sourceIdentifier": "security@knime.com",
44
"published": "2025-12-08T10:16:01.047",
5-
"lastModified": "2025-12-08T18:26:19.900",
6-
"vulnStatus": "Undergoing Analysis",
5+
"lastModified": "2026-02-27T03:38:57.107",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -55,6 +55,28 @@
5555
"providerUrgency": "GREEN"
5656
}
5757
}
58+
],
59+
"cvssMetricV31": [
60+
{
61+
"source": "nvd@nist.gov",
62+
"type": "Primary",
63+
"cvssData": {
64+
"version": "3.1",
65+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
66+
"baseScore": 4.3,
67+
"baseSeverity": "MEDIUM",
68+
"attackVector": "NETWORK",
69+
"attackComplexity": "LOW",
70+
"privilegesRequired": "LOW",
71+
"userInteraction": "NONE",
72+
"scope": "UNCHANGED",
73+
"confidentialityImpact": "NONE",
74+
"integrityImpact": "LOW",
75+
"availabilityImpact": "NONE"
76+
},
77+
"exploitabilityScore": 2.8,
78+
"impactScore": 1.4
79+
}
5880
]
5981
},
6082
"weaknesses": [
@@ -69,10 +91,31 @@
6991
]
7092
}
7193
],
94+
"configurations": [
95+
{
96+
"nodes": [
97+
{
98+
"operator": "OR",
99+
"negate": false,
100+
"cpeMatch": [
101+
{
102+
"vulnerable": true,
103+
"criteria": "cpe:2.3:a:knime:business_hub:*:*:*:*:*:*:*:*",
104+
"versionEndExcluding": "1.17.0",
105+
"matchCriteriaId": "D16AA853-3F50-4B2F-BFB1-59EE07944BBB"
106+
}
107+
]
108+
}
109+
]
110+
}
111+
],
72112
"references": [
73113
{
74114
"url": "https://www.knime.com/security/advisories#CVE-2025-11239",
75-
"source": "security@knime.com"
115+
"source": "security@knime.com",
116+
"tags": [
117+
"Vendor Advisory"
118+
]
76119
}
77120
]
78121
}

CVE-2025/CVE-2025-144xx/CVE-2025-14443.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2025-14443",
33
"sourceIdentifier": "secalert@redhat.com",
44
"published": "2025-12-16T13:15:56.720",
5-
"lastModified": "2025-12-16T14:10:11.300",
5+
"lastModified": "2026-02-27T04:16:00.760",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
@@ -15,23 +15,23 @@
1515
"cvssMetricV31": [
1616
{
1717
"source": "secalert@redhat.com",
18-
"type": "Secondary",
18+
"type": "Primary",
1919
"cvssData": {
2020
"version": "3.1",
21-
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
22-
"baseScore": 8.5,
23-
"baseSeverity": "HIGH",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L",
22+
"baseScore": 6.4,
23+
"baseSeverity": "MEDIUM",
2424
"attackVector": "NETWORK",
2525
"attackComplexity": "LOW",
2626
"privilegesRequired": "LOW",
2727
"userInteraction": "NONE",
2828
"scope": "CHANGED",
29-
"confidentialityImpact": "HIGH",
29+
"confidentialityImpact": "LOW",
3030
"integrityImpact": "NONE",
3131
"availabilityImpact": "LOW"
3232
},
3333
"exploitabilityScore": 3.1,
34-
"impactScore": 4.7
34+
"impactScore": 2.7
3535
}
3636
]
3737
},

0 commit comments

Comments
 (0)