Upload vulnerability_assessment dataset
Browse files
.gitattributes
CHANGED
|
@@ -59,3 +59,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 60 |
network_intrusion/network_intrusion.csv filter=lfs diff=lfs merge=lfs -text
|
| 61 |
network_intrusion/network_intrusion_processed.csv filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 60 |
network_intrusion/network_intrusion.csv filter=lfs diff=lfs merge=lfs -text
|
| 61 |
network_intrusion/network_intrusion_processed.csv filter=lfs diff=lfs merge=lfs -text
|
| 62 |
+
vulnerability_assessment/vulnerability_assessment_processed.csv filter=lfs diff=lfs merge=lfs -text
|
vulnerability_assessment/metadata.json
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"dataset_id": "vulnerability_assessment",
|
| 3 |
+
<<<<<<< Updated upstream
|
| 4 |
+
"processed_at": "2025-08-24T04:15:31.231817",
|
| 5 |
+
"samples": 5000,
|
| 6 |
+
=======
|
| 7 |
+
"processed_at": "2025-08-24T03:05:15.020981",
|
| 8 |
+
"samples": 200000,
|
| 9 |
+
>>>>>>> Stashed changes
|
| 10 |
+
"features": [
|
| 11 |
+
"cve_id",
|
| 12 |
+
"description",
|
| 13 |
+
"severity",
|
| 14 |
+
<<<<<<< Updated upstream
|
| 15 |
+
"cvss_score",
|
| 16 |
+
"attack_vector",
|
| 17 |
+
"attack_complexity"
|
| 18 |
+
=======
|
| 19 |
+
"impact",
|
| 20 |
+
"exploitability"
|
| 21 |
+
>>>>>>> Stashed changes
|
| 22 |
+
],
|
| 23 |
+
"type": "vulnerability",
|
| 24 |
+
"file_path": "..\\datasets\\vulnerability_assessment\\vulnerability_assessment_processed.csv"
|
| 25 |
+
}
|
vulnerability_assessment/vulnerability_assessment.csv
ADDED
|
@@ -0,0 +1,694 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<!DOCTYPE html>
|
| 2 |
+
<html lang="en">
|
| 3 |
+
<head>
|
| 4 |
+
<meta content="IE=Edge" http-equiv="X-UA-Compatible">
|
| 5 |
+
<meta content="text/html; charset=utf-8" http-equiv="content-type">
|
| 6 |
+
<link href="css/main.css" rel="stylesheet" type="text/css">
|
| 7 |
+
<link href="css/dropdown.css" rel="stylesheet" type="text/css">
|
| 8 |
+
<script src="includes/jquery-3.2.1.min.js">
|
| 9 |
+
</script>
|
| 10 |
+
<script src="includes/jquery-migrate-3.0.0.min.js">
|
| 11 |
+
</script>
|
| 12 |
+
<script src="includes/browserheight.js">
|
| 13 |
+
</script>
|
| 14 |
+
<link href="css/print.css" media="print" rel="stylesheet" type="text/css">
|
| 15 |
+
<title>
|
| 16 |
+
CVE -
|
| 17 |
+
|
| 18 |
+
CVE
|
| 19 |
+
</title>
|
| 20 |
+
</head>
|
| 21 |
+
<body>
|
| 22 |
+
<div id="Page">
|
| 23 |
+
<!--Header-->
|
| 24 |
+
<div id="Header">
|
| 25 |
+
<table style="width:100%;border-collapse:collapse" summary="Header Layout Table">
|
| 26 |
+
<tr>
|
| 27 |
+
<td style="vertical-align:middle; text-align:left; white-space:nowrap; padding-bottom: 0">
|
| 28 |
+
<div style="width:170px;">
|
| 29 |
+
<a class="none" href="index.html">
|
| 30 |
+
<img alt="CVE" height="53" src="images/cvelogobanner.png" style="border:0" width="204">
|
| 31 |
+
</a>
|
| 32 |
+
</div>
|
| 33 |
+
</td>
|
| 34 |
+
<td style="vertical-align:top;text-align:center;width:100%">
|
| 35 |
+
<div class="alignright" style="float:right;vertical-align:top;">
|
| 36 |
+
<table style="text-align:right">
|
| 37 |
+
<tr>
|
| 38 |
+
<td>
|
| 39 |
+
<a href="https://nvd.nist.gov/" target="_blank">
|
| 40 |
+
<img alt="NVD" border="0" height="18" src="images/nvd-logo.png" width="78">
|
| 41 |
+
</a>
|
| 42 |
+
</td>
|
| 43 |
+
</tr>
|
| 44 |
+
<tr>
|
| 45 |
+
<td>
|
| 46 |
+
<strong>
|
| 47 |
+
Go to for:
|
| 48 |
+
</strong>
|
| 49 |
+
</td>
|
| 50 |
+
</tr>
|
| 51 |
+
<tr>
|
| 52 |
+
<td>
|
| 53 |
+
<a href="https://nvd.nist.gov/vuln-metrics/cvss" target="_blank">
|
| 54 |
+
CVSS Scores
|
| 55 |
+
</a>
|
| 56 |
+
<br>
|
| 57 |
+
<a href="https://nvd.nist.gov/products" target="_blank">
|
| 58 |
+
CPE Info
|
| 59 |
+
</a>
|
| 60 |
+
<br>
|
| 61 |
+
</td>
|
| 62 |
+
</tr>
|
| 63 |
+
</table>
|
| 64 |
+
</div>
|
| 65 |
+
<!--Page-->
|
| 66 |
+
|
| 67 |
+
<div class="dropdown">
|
| 68 |
+
<a href="cve/index.html">
|
| 69 |
+
<button class="dropbtn">
|
| 70 |
+
CVE List▾
|
| 71 |
+
</button>
|
| 72 |
+
</a>
|
| 73 |
+
<div class="dropdown-content">
|
| 74 |
+
<strong>
|
| 75 |
+
<a href="cve/index.html">
|
| 76 |
+
CVE List Home
|
| 77 |
+
</a>
|
| 78 |
+
</strong>
|
| 79 |
+
<a href="find/search_tips.html">
|
| 80 |
+
Search Tips
|
| 81 |
+
</a>
|
| 82 |
+
<a href="about/termsofuse.html">
|
| 83 |
+
Terms of Use
|
| 84 |
+
</a>
|
| 85 |
+
<strong>
|
| 86 |
+
<a href="https://cveform.mitre.org/" target="_blank">
|
| 87 |
+
CVE Request Web Form
|
| 88 |
+
</a>
|
| 89 |
+
</strong>
|
| 90 |
+
<a href="about/faqs.html">
|
| 91 |
+
Web Form Help
|
| 92 |
+
</a>
|
| 93 |
+
<a href="cve/request_id.html#mitre_cna_lr_pgp_key">
|
| 94 |
+
PGP Key
|
| 95 |
+
</a>
|
| 96 |
+
<strong>
|
| 97 |
+
<a href="about/documents.html">
|
| 98 |
+
CVE List Documents & Guidance
|
| 99 |
+
</a>
|
| 100 |
+
</strong>
|
| 101 |
+
<a href="about/getting_started.html">
|
| 102 |
+
New to the CVE List? Start Here
|
| 103 |
+
</a>
|
| 104 |
+
</div>
|
| 105 |
+
</div>
|
| 106 |
+
|
| 107 |
+
<div class="dropdown">
|
| 108 |
+
<a href="cve/cna.html">
|
| 109 |
+
<button class="dropbtn">
|
| 110 |
+
CNAs▾
|
| 111 |
+
</button>
|
| 112 |
+
</a>
|
| 113 |
+
<div class="dropdown-content">
|
| 114 |
+
<strong>
|
| 115 |
+
<a href="cve/cna.html">
|
| 116 |
+
CVE Numbering Authorities (CNAs)
|
| 117 |
+
</a>
|
| 118 |
+
</strong>
|
| 119 |
+
<a href="cve/request_id.html">
|
| 120 |
+
Participating CNAs
|
| 121 |
+
</a>
|
| 122 |
+
<a href="cve/cna.html">
|
| 123 |
+
Growth of CNA Program Worldwide
|
| 124 |
+
</a>
|
| 125 |
+
<strong>
|
| 126 |
+
<a href="about/documents.html">
|
| 127 |
+
CNA Documents, Policies & Guidance
|
| 128 |
+
</a>
|
| 129 |
+
</strong>
|
| 130 |
+
<a href="cve/cna/rules.html">
|
| 131 |
+
CNA Rules, Version 3.0
|
| 132 |
+
</a>
|
| 133 |
+
<a href="cve/cna/rules.html">
|
| 134 |
+
CVE ID Assignment Rules
|
| 135 |
+
</a>
|
| 136 |
+
<a href="cve/cna/CVE_Program_End_of_Life_EOL_Assignment_Process.html">
|
| 137 |
+
EOL
|
| 138 |
+
</a>
|
| 139 |
+
<a href="cve/cna/resources.html">
|
| 140 |
+
CNA Resources
|
| 141 |
+
</a>
|
| 142 |
+
<strong>
|
| 143 |
+
<a href="about/documents.html">
|
| 144 |
+
New CNA Onboarding
|
| 145 |
+
</a>
|
| 146 |
+
</strong>
|
| 147 |
+
<a href="cve/cna.html">
|
| 148 |
+
Slides & Videos
|
| 149 |
+
</a>
|
| 150 |
+
<strong>
|
| 151 |
+
<a href="cve/cna.html">
|
| 152 |
+
Why Become a CNA?
|
| 153 |
+
</a>
|
| 154 |
+
</strong>
|
| 155 |
+
<a href="cve/cna.html">
|
| 156 |
+
Business Benefits
|
| 157 |
+
</a>
|
| 158 |
+
<a href="cve/cna.html">
|
| 159 |
+
Join Today!
|
| 160 |
+
</a>
|
| 161 |
+
</div>
|
| 162 |
+
</div>
|
| 163 |
+
|
| 164 |
+
<div class="dropdown">
|
| 165 |
+
<a href="working_groups.html">
|
| 166 |
+
<button class="dropbtn">
|
| 167 |
+
WGs▾
|
| 168 |
+
</button>
|
| 169 |
+
</a>
|
| 170 |
+
<div class="dropdown-content">
|
| 171 |
+
<strong>
|
| 172 |
+
<a href="working_groups.html">
|
| 173 |
+
CVE Working Groups
|
| 174 |
+
</a>
|
| 175 |
+
</strong>
|
| 176 |
+
<a href="working_groups.html">
|
| 177 |
+
Automation (AWG)
|
| 178 |
+
</a>
|
| 179 |
+
<a href="working_groups.html">
|
| 180 |
+
Strategic Planning (SPWG)
|
| 181 |
+
</a>
|
| 182 |
+
<a href="working_groups.html">
|
| 183 |
+
CNA Coordination (CNACWG)
|
| 184 |
+
</a>
|
| 185 |
+
<a href="working_groups.html">
|
| 186 |
+
CVE Quality (QWG)
|
| 187 |
+
</a>
|
| 188 |
+
<a href="working_groups.html">
|
| 189 |
+
Outreach and Communications (OCWG)
|
| 190 |
+
</a>
|
| 191 |
+
<a href="working_groups.html">
|
| 192 |
+
Transition (TWG)
|
| 193 |
+
</a>
|
| 194 |
+
</div>
|
| 195 |
+
</div>
|
| 196 |
+
|
| 197 |
+
<div class="dropdown">
|
| 198 |
+
<a href="community/board/index.html">
|
| 199 |
+
<button class="dropbtn">
|
| 200 |
+
Board▾
|
| 201 |
+
</button>
|
| 202 |
+
</a>
|
| 203 |
+
<div class="dropdown-content">
|
| 204 |
+
<strong>
|
| 205 |
+
<a href="community/board/index.html">
|
| 206 |
+
CVE Board
|
| 207 |
+
</a>
|
| 208 |
+
</strong>
|
| 209 |
+
<a href="community/board/index.html">
|
| 210 |
+
Members
|
| 211 |
+
</a>
|
| 212 |
+
<a href="community/board/archive.html#board_mail_list_archive">
|
| 213 |
+
Email Archives
|
| 214 |
+
</a>
|
| 215 |
+
<a href="community/board/archive.html#meeting_summaries">
|
| 216 |
+
Meeting Archives
|
| 217 |
+
</a>
|
| 218 |
+
<a href="community/board/charter.html">
|
| 219 |
+
Board Charter
|
| 220 |
+
</a>
|
| 221 |
+
</div>
|
| 222 |
+
</div>
|
| 223 |
+
|
| 224 |
+
<div class="dropdown">
|
| 225 |
+
<a href="about/index.html">
|
| 226 |
+
<button class="dropbtn">
|
| 227 |
+
About▾
|
| 228 |
+
</button>
|
| 229 |
+
</a>
|
| 230 |
+
<div class="dropdown-content">
|
| 231 |
+
<strong>
|
| 232 |
+
<a href="about/index.html">
|
| 233 |
+
About CVE
|
| 234 |
+
</a>
|
| 235 |
+
</strong>
|
| 236 |
+
<a href="about/professional_code_of_conduct.html">
|
| 237 |
+
Professional Code of Conduct
|
| 238 |
+
</a>
|
| 239 |
+
<a href="about/cve_and_nvd_relationship.html">
|
| 240 |
+
CVE & NVD Relationship
|
| 241 |
+
</a>
|
| 242 |
+
<a href="about/history.html">
|
| 243 |
+
History
|
| 244 |
+
</a>
|
| 245 |
+
<a href="community/sponsor.html">
|
| 246 |
+
Sponsor
|
| 247 |
+
</a>
|
| 248 |
+
<strong>
|
| 249 |
+
<a href="about/documents.html">
|
| 250 |
+
Documentation & Guidance
|
| 251 |
+
</a>
|
| 252 |
+
</strong>
|
| 253 |
+
<a href="about/faqs.html">
|
| 254 |
+
FAQs
|
| 255 |
+
</a>
|
| 256 |
+
<a href="about/terminology.html">
|
| 257 |
+
Terminology
|
| 258 |
+
</a>
|
| 259 |
+
<a href="about/getting_started.html">
|
| 260 |
+
New to the CVE Program? Start Here
|
| 261 |
+
</a>
|
| 262 |
+
</div>
|
| 263 |
+
</div>
|
| 264 |
+
|
| 265 |
+
<div class="dropdown">
|
| 266 |
+
<a href="news/archives/index.html">
|
| 267 |
+
<button class="dropbtn">
|
| 268 |
+
News & Blog▾
|
| 269 |
+
</button>
|
| 270 |
+
</a>
|
| 271 |
+
<div class="dropdown-content">
|
| 272 |
+
<a href="news/archives/2021/news.html">
|
| 273 |
+
Latest CVE News
|
| 274 |
+
</a>
|
| 275 |
+
<a href="blog/index.html">
|
| 276 |
+
Blog
|
| 277 |
+
</a>
|
| 278 |
+
<a href="podcast/">
|
| 279 |
+
Podcast
|
| 280 |
+
</a>
|
| 281 |
+
<a href="news/archives/2021/calendar.html">
|
| 282 |
+
Calendar
|
| 283 |
+
</a>
|
| 284 |
+
<a href="news/archives/index.html">
|
| 285 |
+
Archive
|
| 286 |
+
</a>
|
| 287 |
+
<strong>
|
| 288 |
+
<a href="cve/data_feeds.html">
|
| 289 |
+
Follow CVE
|
| 290 |
+
</a>
|
| 291 |
+
</strong>
|
| 292 |
+
<a href="news/newsletter.html">
|
| 293 |
+
Free CVE Newsletter
|
| 294 |
+
</a>
|
| 295 |
+
<a href="https://twitter.com/CVEnew/" target="_blank">
|
| 296 |
+
CVEnew Twitter Feed
|
| 297 |
+
<img alt="Twitter" border="0" height="14" src="images/twitter.jpg" width="14">
|
| 298 |
+
</a>
|
| 299 |
+
<a href="https://twitter.com/CVEannounce/" target="_blank">
|
| 300 |
+
CVEannounce Twitter Feed
|
| 301 |
+
<img alt="Twitter" border="0" height="14" src="images/twitter.jpg" width="14">
|
| 302 |
+
</a>
|
| 303 |
+
<a href="https://medium.com/@CVE_Program" target="_blank">
|
| 304 |
+
CVE on Medium
|
| 305 |
+
<img alt="Medium" border="0" height="14" src="images/medium.png" width="14">
|
| 306 |
+
</a>
|
| 307 |
+
<a href="https://www.linkedin.com/showcase/cve-cwe-capec" target="_blank">
|
| 308 |
+
CVE on LinkedIn
|
| 309 |
+
<img alt="LinkedIn" border="0" height="14" src="images/linkedin.jpg" width="14">
|
| 310 |
+
</a>
|
| 311 |
+
<a href="https://github.com/CVEProject" target="_blank">
|
| 312 |
+
CVEProject on GitHub
|
| 313 |
+
<img alt="GitHub" border="0" height="14" src="images/GitHub_round_sm" title="GitHub" width="14">
|
| 314 |
+
</a>
|
| 315 |
+
<a href="https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/" target="_blank">
|
| 316 |
+
CVE on YouTube
|
| 317 |
+
<img alt="YouTube" border="0" height="14" src="images/youtube.png" title="YouTube" width="16">
|
| 318 |
+
</a>
|
| 319 |
+
</div>
|
| 320 |
+
</div>
|
| 321 |
+
</td>
|
| 322 |
+
</tr>
|
| 323 |
+
<tr>
|
| 324 |
+
<td colspan="2" style="vertical-align:top">
|
| 325 |
+
<!--NavBar-->
|
| 326 |
+
<div class="noprint" id="NavBar">
|
| 327 |
+
|
| 328 |
+
<div class="NavSection">
|
| 329 |
+
<a href="https://cve.org">
|
| 330 |
+
Search CVE List
|
| 331 |
+
</a>
|
| 332 |
+
</div>
|
| 333 |
+
|
| 334 |
+
<div class="NavSection">
|
| 335 |
+
<a href="https://cve.org/Downloads">
|
| 336 |
+
Downloads
|
| 337 |
+
</a>
|
| 338 |
+
</div>
|
| 339 |
+
|
| 340 |
+
<div class="NavSection">
|
| 341 |
+
<a href="cve/data_feeds.html">
|
| 342 |
+
Data Feeds
|
| 343 |
+
</a>
|
| 344 |
+
</div>
|
| 345 |
+
|
| 346 |
+
<div class="NavSection">
|
| 347 |
+
<a href="cve/update_cve_records.html">
|
| 348 |
+
Update a CVE Record
|
| 349 |
+
</a>
|
| 350 |
+
</div>
|
| 351 |
+
|
| 352 |
+
<div class="NavSection">
|
| 353 |
+
<a href="cve/request_id.html">
|
| 354 |
+
Request CVE IDs
|
| 355 |
+
</a>
|
| 356 |
+
</div>
|
| 357 |
+
|
| 358 |
+
</div>
|
| 359 |
+
<!--/NavBar-->
|
| 360 |
+
</td>
|
| 361 |
+
</tr>
|
| 362 |
+
<tr>
|
| 363 |
+
<td colspan="2" style="vertical-align:top">
|
| 364 |
+
<!--HeaderBar-->
|
| 365 |
+
<div class="noprint" id="HeaderBar">
|
| 366 |
+
<br>
|
| 367 |
+
NOTICE:
|
| 368 |
+
<span class="ltredbold">
|
| 369 |
+
You are viewing an ARCHIVE of the old CVE website.
|
| 370 |
+
This is available for historical purposes ONLY.
|
| 371 |
+
All the content is obsolete. The current website is
|
| 372 |
+
<a href="https://www.cve.org">
|
| 373 |
+
CVE.ORG
|
| 374 |
+
</a>
|
| 375 |
+
.
|
| 376 |
+
</span>
|
| 377 |
+
<br>
|
| 378 |
+
<br>
|
| 379 |
+
</div>
|
| 380 |
+
<!--/HeaderBar-->
|
| 381 |
+
</td>
|
| 382 |
+
</tr>
|
| 383 |
+
</table>
|
| 384 |
+
<style type="text/css">
|
| 385 |
+
.alignright {
|
| 386 |
+
text-align: right;
|
| 387 |
+
font-size: x-small;
|
| 388 |
+
}
|
| 389 |
+
</style>
|
| 390 |
+
<div class="noprint" id="BreadCrumbs">
|
| 391 |
+
|
| 392 |
+
</div>
|
| 393 |
+
<!--/Header-->
|
| 394 |
+
</div>
|
| 395 |
+
<!--Page-->
|
| 396 |
+
</div>
|
| 397 |
+
<!-- begin section menu -->
|
| 398 |
+
<div id="LeftPane">
|
| 399 |
+
</div>
|
| 400 |
+
<!-- end section menu -->
|
| 401 |
+
<!-- begin content pane -->
|
| 402 |
+
<div style="width: 100%; left: 0px; position: relative; right: 0px; top: 0px;">
|
| 403 |
+
<!--begin Main Content-->
|
| 404 |
+
<br>
|
| 405 |
+
<div style="width:100%; text-align: center; font-style: bold; font-size: 90%; color: grey; position: bottom: 5px; top: 5px; letter-spacing: 1px; word-spacing: 2px;">
|
| 406 |
+
<p>
|
| 407 |
+
The mission of the CVE<sup>™</sup> Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
|
| 408 |
+
</p>
|
| 409 |
+
</div>
|
| 410 |
+
<br>
|
| 411 |
+
</div>
|
| 412 |
+
<table cellpadding="1" cellspacing="1" style="padding-bottom:5px;padding-top:8px" width="100%">
|
| 413 |
+
<tr>
|
| 414 |
+
<td class="callout" style="width:31%;vertical-align:top; height: 200px;">
|
| 415 |
+
<div class="tablehead" id="LatestNews" style="text-decoration:none">
|
| 416 |
+
<a class="nounderline" href="news/archives/2021/news.html" title="Latest CVE News">
|
| 417 |
+
<span class="whitefont">
|
| 418 |
+
Latest CVE News
|
| 419 |
+
</span>
|
| 420 |
+
</a>
|
| 421 |
+
</div>
|
| 422 |
+
<ul>
|
| 423 |
+
<li>
|
| 424 |
+
<a href="news/archives/2021/news.html">
|
| 425 |
+
Censys Added as CVE Numbering Authority (CNA)
|
| 426 |
+
</a>
|
| 427 |
+
</li>
|
| 428 |
+
<li>
|
| 429 |
+
<a href="news/archives/2021/news.html">
|
| 430 |
+
CVE Website Transitioning to New Web Address – “CVE.ORG”
|
| 431 |
+
</a>
|
| 432 |
+
</li>
|
| 433 |
+
</ul>
|
| 434 |
+
<div style="font-size:100%;text-align:right;padding-top:0px">
|
| 435 |
+
<a href="news/archives/2021/news.html">
|
| 436 |
+
More News >>
|
| 437 |
+
</a>
|
| 438 |
+
<br>
|
| 439 |
+
<br>
|
| 440 |
+
<br>
|
| 441 |
+
<div class="tablehead" id="CVE Podcast" style="text-decoration:none">
|
| 442 |
+
<a class="nounderline" href="podcast/" title="CVE Podcast">
|
| 443 |
+
<span class="whitefont">
|
| 444 |
+
CVE Podcast
|
| 445 |
+
</span>
|
| 446 |
+
</a>
|
| 447 |
+
</div>
|
| 448 |
+
<div style="font-size:100%;text-align:left;padding-top:3px">
|
| 449 |
+
<p style="padding-top:0px;">
|
| 450 |
+
<strong>
|
| 451 |
+
<a href="https://youtu.be/IT9HlBOeKKc" target="_blank">
|
| 452 |
+
CVE Working Groups, What They Are and How They Improve CVE
|
| 453 |
+
</a>
|
| 454 |
+
</strong>
|
| 455 |
+
</p>
|
| 456 |
+
<p>
|
| 457 |
+
Community members actively engage in six CVE WGs to help improve quality, automation, processes, and other aspects of the CVE Program as it continues to grow and expand. In this episode, the chairs and co-chairs of each WG chat about their WG’s overall mission, current work, and future plans.
|
| 458 |
+
</p>
|
| 459 |
+
<div style="font-size:100%;text-align:right;padding-top:12px">
|
| 460 |
+
<a href="https://youtu.be/IT9HlBOeKKc" target="_blank">
|
| 461 |
+
Listen Now >>
|
| 462 |
+
</a>
|
| 463 |
+
</div>
|
| 464 |
+
</div>
|
| 465 |
+
<td style="width:1%; vertical-align:top; height: 272px;">
|
| 466 |
+
</td>
|
| 467 |
+
<td class="callout2" style="width:39%; vertical-align:top; height: 200px;">
|
| 468 |
+
<div class="tablehead" id="Become a CNA">
|
| 469 |
+
<a class="nounderline" href="cve/cna.html" title="Become a CNA">
|
| 470 |
+
<span class="whitefont">
|
| 471 |
+
Become a CNA
|
| 472 |
+
</span>
|
| 473 |
+
</a>
|
| 474 |
+
</div>
|
| 475 |
+
<div>
|
| 476 |
+
<table cellpadding="1" cellspacing="1" style="width:100%;">
|
| 477 |
+
<tr>
|
| 478 |
+
<td style="verticalalign:top; padding-top:0px; padding-right;20px;">
|
| 479 |
+
<a href="cve/cna.html">
|
| 480 |
+
CVE Numbering Authorities
|
| 481 |
+
</a>
|
| 482 |
+
,
|
| 483 |
+
<br>
|
| 484 |
+
or “CNAs,” are essential to
|
| 485 |
+
<br>
|
| 486 |
+
the CVE Program’s success
|
| 487 |
+
<br>
|
| 488 |
+
and every
|
| 489 |
+
<a href="about/terminology.html">
|
| 490 |
+
CVE Record
|
| 491 |
+
</a>
|
| 492 |
+
is added
|
| 493 |
+
<br>
|
| 494 |
+
to the
|
| 495 |
+
<a href="cve/index.html">
|
| 496 |
+
CVE List
|
| 497 |
+
</a>
|
| 498 |
+
by a CNA.
|
| 499 |
+
<br>
|
| 500 |
+
<br>
|
| 501 |
+
<strong>
|
| 502 |
+
Join today!
|
| 503 |
+
</strong>
|
| 504 |
+
<ul>
|
| 505 |
+
<li>
|
| 506 |
+
<a href="cve/cna.html">
|
| 507 |
+
Business benefits
|
| 508 |
+
</a>
|
| 509 |
+
</li>
|
| 510 |
+
<li>
|
| 511 |
+
<a href="cve/cna.html">
|
| 512 |
+
No fee or contract
|
| 513 |
+
</a>
|
| 514 |
+
</li>
|
| 515 |
+
<li>
|
| 516 |
+
<a href="cve/cna.html">
|
| 517 |
+
Few requirements
|
| 518 |
+
</a>
|
| 519 |
+
</li>
|
| 520 |
+
<li>
|
| 521 |
+
<a href="cve/cna.html">
|
| 522 |
+
Easy to join
|
| 523 |
+
</a>
|
| 524 |
+
</li>
|
| 525 |
+
</ul>
|
| 526 |
+
<br>
|
| 527 |
+
<br>
|
| 528 |
+
<br>
|
| 529 |
+
</td>
|
| 530 |
+
<td style="font-size:89%; text-align:center; verticalalign:top; padding-bottom:0px;">
|
| 531 |
+
Total CNAs:
|
| 532 |
+
<strong>
|
| 533 |
+
<a href="cve/request_id.html">
|
| 534 |
+
182
|
| 535 |
+
</a>
|
| 536 |
+
</strong>
|
| 537 |
+
| Total Countries:
|
| 538 |
+
<strong>
|
| 539 |
+
<a href="cve/cna.html">
|
| 540 |
+
31
|
| 541 |
+
</a>
|
| 542 |
+
</strong>
|
| 543 |
+
<br>
|
| 544 |
+
<br>
|
| 545 |
+
<div>
|
| 546 |
+
<a href="cve/cna.html">
|
| 547 |
+
<img align:right; alt="CNAs World Map - September 2021" height="180" src="images/cna_world_map/CNA_World_Map_September_2021.png" width="218">
|
| 548 |
+
</a>
|
| 549 |
+
</div>
|
| 550 |
+
<br>
|
| 551 |
+
<br>
|
| 552 |
+
<br>
|
| 553 |
+
</td>
|
| 554 |
+
</tr>
|
| 555 |
+
</table>
|
| 556 |
+
</div>
|
| 557 |
+
<div style="font-size:100%;text-align:right;padding-top:0px">
|
| 558 |
+
<a href="cve/cna.html">
|
| 559 |
+
Learn How to Become a CNA >>>
|
| 560 |
+
</a>
|
| 561 |
+
<br>
|
| 562 |
+
<br>
|
| 563 |
+
<a href="cve/cna.html">
|
| 564 |
+
Watch CNA Onboarding Videos >>
|
| 565 |
+
</a>
|
| 566 |
+
</div>
|
| 567 |
+
<td style="width:1%; vertical-align:top; height: 272px;">
|
| 568 |
+
</td>
|
| 569 |
+
<td class="callout2" style="width:29%; vertical-align:top; height: 200px;">
|
| 570 |
+
<div class="tablehead" id="New CVE Records" style="text-decoration:none">
|
| 571 |
+
<a class="nounderline" href="cve/data_feeds.html" title="New CVE Records">
|
| 572 |
+
<span class="whitefont">
|
| 573 |
+
Newest CVE Records
|
| 574 |
+
</span>
|
| 575 |
+
</a>
|
| 576 |
+
</div>
|
| 577 |
+
<a class="twitter-timeline" data-border-color="#FFFFFF" data-chrome="nofooter transparent no header transparent" data-dnt="true" data-height="260" data-link-color="#0084b4" data-width="350" href="https://twitter.com/CVEnew">
|
| 578 |
+
Newest CVE IDs by @CVEnew
|
| 579 |
+
</a>
|
| 580 |
+
<div style="font-size:100%;text-align:right;padding-top:30px">
|
| 581 |
+
<a href="https://twitter.com/CVEnew/" target="_blank">
|
| 582 |
+
Follow @CVEnew >>
|
| 583 |
+
</a>
|
| 584 |
+
</div>
|
| 585 |
+
</td>
|
| 586 |
+
</td>
|
| 587 |
+
</div>
|
| 588 |
+
</td>
|
| 589 |
+
</tr>
|
| 590 |
+
</table>
|
| 591 |
+
<br>
|
| 592 |
+
<br>
|
| 593 |
+
<br>
|
| 594 |
+
<style type="text/css">
|
| 595 |
+
.nounderline {
|
| 596 |
+
text-decoration: none;
|
| 597 |
+
}
|
| 598 |
+
.whitefont {
|
| 599 |
+
color: #FFFFFF;
|
| 600 |
+
}
|
| 601 |
+
.marginbottom {
|
| 602 |
+
margin-bottom: 50px;
|
| 603 |
+
}
|
| 604 |
+
</style>
|
| 605 |
+
<!--end Main Content-->
|
| 606 |
+
<!-- end content pane -->
|
| 607 |
+
<!--/Page-->
|
| 608 |
+
<!--Footer-->
|
| 609 |
+
<div class="noprint" id="FootPane">
|
| 610 |
+
<div id="footbar">
|
| 611 |
+
<span style="font-weight:bold">
|
| 612 |
+
Page Last Updated or Reviewed:
|
| 613 |
+
</span>
|
| 614 |
+
September 08, 2021
|
| 615 |
+
</div>
|
| 616 |
+
<div>
|
| 617 |
+
<div id="Footer">
|
| 618 |
+
<table>
|
| 619 |
+
<tr>
|
| 620 |
+
<td>
|
| 621 |
+
<div class="noprint" style="font-size:70%; text-align:center; padding-top:0px; padding-bottom:3px;">
|
| 622 |
+
<b>
|
| 623 |
+
<a href="sitemap.html">
|
| 624 |
+
Site Map
|
| 625 |
+
</a>
|
| 626 |
+
|
|
| 627 |
+
<a href="about/termsofuse.html">
|
| 628 |
+
Terms of Use
|
| 629 |
+
</a>
|
| 630 |
+
|
|
| 631 |
+
<a href="about/privacy_policy.html">
|
| 632 |
+
Privacy Policy
|
| 633 |
+
</a>
|
| 634 |
+
|
|
| 635 |
+
<a href="about/contactus.html">
|
| 636 |
+
Contact Us
|
| 637 |
+
</a>
|
| 638 |
+
|
|
| 639 |
+
Follow CVE
|
| 640 |
+
</b>
|
| 641 |
+
|
| 642 |
+
<a href="https://twitter.com/CVEnew/" target="_blank">
|
| 643 |
+
<img alt="Twitter" height="20" src="images/twitter.jpg" style="border:0;vertical-align:right;margin-left:3px;margin-right:3px;" title="@CVEnew Twitter" width="20">
|
| 644 |
+
</a>
|
| 645 |
+
<a href="https://www.linkedin.com/showcase/cve-cwe-capec" target="_blank">
|
| 646 |
+
<img alt="LinkedIn" height="20" src="images/linkedin.jpg" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" title="CVE on LinkedIn" width="20">
|
| 647 |
+
</a>
|
| 648 |
+
<a href="https://github.com/CVEProject" target="_blank">
|
| 649 |
+
<img alt="GitHub" height="20" src="images/GitHub_round_sm" style="border:0;vertical-align:right;margin-left:0px;margin-right:1px;" title="CVEProject on GitHub" width="20">
|
| 650 |
+
</a>
|
| 651 |
+
<a href="https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/" target="_blank">
|
| 652 |
+
<img alt="YouTube" height="20" src="images/youtube.png" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" title="CVE on YouTube" width="22">
|
| 653 |
+
</a>
|
| 654 |
+
<a href="https://medium.com/@cve_program" target="_blank">
|
| 655 |
+
<img alt="Medium" height="20" src="images/medium.png" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" title="CVE on Medium" width="20">
|
| 656 |
+
</a>
|
| 657 |
+
|
| 658 |
+
<a href="find/index.html">
|
| 659 |
+
<img height="21" src="images/search_icon.png" style="border:0;vertical-align:right;margin-left:0px;margin-right:3px;" title="Search CVE Website" width="21">
|
| 660 |
+
</a>
|
| 661 |
+
</div>
|
| 662 |
+
</td>
|
| 663 |
+
</tr>
|
| 664 |
+
<tr>
|
| 665 |
+
<td>
|
| 666 |
+
<p>
|
| 667 |
+
Use of the CVE<sup>™</sup> List and the associated references from this website are subject to the
|
| 668 |
+
<a href="about/termsofuse.html">
|
| 669 |
+
terms of use
|
| 670 |
+
</a>
|
| 671 |
+
.
|
| 672 |
+
CVE is sponsored by the
|
| 673 |
+
<a href="https://www.dhs.gov/" target="_blank">
|
| 674 |
+
U.S. Department of Homeland Security
|
| 675 |
+
</a>
|
| 676 |
+
(DHS)
|
| 677 |
+
<a href="https://www.dhs.gov/cisa/cybersecurity-division/" target="_blank">
|
| 678 |
+
Cybersecurity and Infrastructure Security Agency
|
| 679 |
+
</a>
|
| 680 |
+
(CISA). Copyright © 1999–2021,
|
| 681 |
+
<a href="https://www.mitre.org/" target="_blank">
|
| 682 |
+
The MITRE Corporation
|
| 683 |
+
</a>
|
| 684 |
+
. CVE is a registered trademark and the CVE logo is a trademark of The MITRE Corporation.
|
| 685 |
+
</p>
|
| 686 |
+
</td>
|
| 687 |
+
</tr>
|
| 688 |
+
</table>
|
| 689 |
+
</div>
|
| 690 |
+
<!--/Footer-->
|
| 691 |
+
</div>
|
| 692 |
+
</div>
|
| 693 |
+
</body>
|
| 694 |
+
</html>
|
vulnerability_assessment/vulnerability_assessment.json
ADDED
|
@@ -0,0 +1,183 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"dataType": "CVE_RECORD",
|
| 3 |
+
"dataVersion": "5.1",
|
| 4 |
+
"cveMetadata": {
|
| 5 |
+
"cveId": "CVE-2023-0001",
|
| 6 |
+
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
|
| 7 |
+
"state": "PUBLISHED",
|
| 8 |
+
"assignerShortName": "palo_alto",
|
| 9 |
+
"dateReserved": "2022-10-27T18:47:48.958Z",
|
| 10 |
+
"datePublished": "2023-02-08T17:20:20.774Z",
|
| 11 |
+
"dateUpdated": "2024-08-02T04:54:32.569Z"
|
| 12 |
+
},
|
| 13 |
+
"containers": {
|
| 14 |
+
"cna": {
|
| 15 |
+
"affected": [
|
| 16 |
+
{
|
| 17 |
+
"defaultStatus": "unaffected",
|
| 18 |
+
"platforms": [
|
| 19 |
+
"Windows"
|
| 20 |
+
],
|
| 21 |
+
"product": "Cortex XDR agent",
|
| 22 |
+
"vendor": "Palo Alto Networks",
|
| 23 |
+
"versions": [
|
| 24 |
+
{
|
| 25 |
+
"status": "unaffected",
|
| 26 |
+
"version": "7.9 All"
|
| 27 |
+
},
|
| 28 |
+
{
|
| 29 |
+
"status": "unaffected",
|
| 30 |
+
"version": "7.8 All"
|
| 31 |
+
},
|
| 32 |
+
{
|
| 33 |
+
"changes": [
|
| 34 |
+
{
|
| 35 |
+
"at": "7.5.101-CE",
|
| 36 |
+
"status": "unaffected"
|
| 37 |
+
}
|
| 38 |
+
],
|
| 39 |
+
"lessThan": "7.5.101-CE",
|
| 40 |
+
"status": "affected",
|
| 41 |
+
"version": "7.5",
|
| 42 |
+
"versionType": "custom"
|
| 43 |
+
},
|
| 44 |
+
{
|
| 45 |
+
"status": "unaffected",
|
| 46 |
+
"version": "5.0 All"
|
| 47 |
+
}
|
| 48 |
+
]
|
| 49 |
+
}
|
| 50 |
+
],
|
| 51 |
+
"credits": [
|
| 52 |
+
{
|
| 53 |
+
"lang": "en",
|
| 54 |
+
"type": "finder",
|
| 55 |
+
"user": "00000000-0000-4000-9000-000000000000",
|
| 56 |
+
"value": "Palo Alto Networks thanks Robert McCallum (M42D) for discovering and reporting this issue."
|
| 57 |
+
}
|
| 58 |
+
],
|
| 59 |
+
"datePublic": "2023-02-08T17:00:00.000Z",
|
| 60 |
+
"descriptions": [
|
| 61 |
+
{
|
| 62 |
+
"lang": "en",
|
| 63 |
+
"supportingMedia": [
|
| 64 |
+
{
|
| 65 |
+
"base64": false,
|
| 66 |
+
"type": "text/html",
|
| 67 |
+
"value": "An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent."
|
| 68 |
+
}
|
| 69 |
+
],
|
| 70 |
+
"value": "An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent."
|
| 71 |
+
}
|
| 72 |
+
],
|
| 73 |
+
"metrics": [
|
| 74 |
+
{
|
| 75 |
+
"cvssV3_1": {
|
| 76 |
+
"attackComplexity": "LOW",
|
| 77 |
+
"attackVector": "LOCAL",
|
| 78 |
+
"availabilityImpact": "HIGH",
|
| 79 |
+
"baseScore": 6,
|
| 80 |
+
"baseSeverity": "MEDIUM",
|
| 81 |
+
"confidentialityImpact": "HIGH",
|
| 82 |
+
"integrityImpact": "NONE",
|
| 83 |
+
"privilegesRequired": "HIGH",
|
| 84 |
+
"scope": "UNCHANGED",
|
| 85 |
+
"userInteraction": "NONE",
|
| 86 |
+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
| 87 |
+
"version": "3.1"
|
| 88 |
+
},
|
| 89 |
+
"format": "CVSS",
|
| 90 |
+
"scenarios": [
|
| 91 |
+
{
|
| 92 |
+
"lang": "en",
|
| 93 |
+
"value": "GENERAL"
|
| 94 |
+
}
|
| 95 |
+
]
|
| 96 |
+
}
|
| 97 |
+
],
|
| 98 |
+
"problemTypes": [
|
| 99 |
+
{
|
| 100 |
+
"descriptions": [
|
| 101 |
+
{
|
| 102 |
+
"cweId": "CWE-319",
|
| 103 |
+
"description": "CWE-319 Cleartext Transmission of Sensitive Information",
|
| 104 |
+
"lang": "en",
|
| 105 |
+
"type": "CWE"
|
| 106 |
+
}
|
| 107 |
+
]
|
| 108 |
+
}
|
| 109 |
+
],
|
| 110 |
+
"providerMetadata": {
|
| 111 |
+
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
|
| 112 |
+
"shortName": "palo_alto",
|
| 113 |
+
"dateUpdated": "2023-11-21T18:25:00.000Z"
|
| 114 |
+
},
|
| 115 |
+
"references": [
|
| 116 |
+
{
|
| 117 |
+
"url": "https://security.paloaltonetworks.com/CVE-2023-0001"
|
| 118 |
+
}
|
| 119 |
+
],
|
| 120 |
+
"solutions": [
|
| 121 |
+
{
|
| 122 |
+
"lang": "en",
|
| 123 |
+
"supportingMedia": [
|
| 124 |
+
{
|
| 125 |
+
"base64": false,
|
| 126 |
+
"type": "text/html",
|
| 127 |
+
"value": "This issue is fixed in Cortex XDR agent 7.5.101-CE and all later supported Cortex XDR agent versions. (Cortex XDR agent 5.0 is not impacted.)<br><br>After you upgrade to a fixed version of the Cortex XDR agent, you must change the agent admin password in case it was already disclosed to users."
|
| 128 |
+
}
|
| 129 |
+
],
|
| 130 |
+
"value": "This issue is fixed in Cortex XDR agent 7.5.101-CE and all later supported Cortex XDR agent versions. (Cortex XDR agent 5.0 is not impacted.)\n\nAfter you upgrade to a fixed version of the Cortex XDR agent, you must change the agent admin password in case it was already disclosed to users."
|
| 131 |
+
}
|
| 132 |
+
],
|
| 133 |
+
"source": {
|
| 134 |
+
"defect": [
|
| 135 |
+
"CPATR-13152"
|
| 136 |
+
],
|
| 137 |
+
"discovery": "INTERNAL"
|
| 138 |
+
},
|
| 139 |
+
"timeline": [
|
| 140 |
+
{
|
| 141 |
+
"lang": "en",
|
| 142 |
+
"time": "2023-02-08T17:00:00.000Z",
|
| 143 |
+
"value": "Initial publication"
|
| 144 |
+
}
|
| 145 |
+
],
|
| 146 |
+
"title": "Cortex XDR Agent: Cleartext Exposure of Agent Admin Password",
|
| 147 |
+
"workarounds": [
|
| 148 |
+
{
|
| 149 |
+
"lang": "en",
|
| 150 |
+
"supportingMedia": [
|
| 151 |
+
{
|
| 152 |
+
"base64": false,
|
| 153 |
+
"type": "text/html",
|
| 154 |
+
"value": "There are no known workarounds for this issue."
|
| 155 |
+
}
|
| 156 |
+
],
|
| 157 |
+
"value": "There are no known workarounds for this issue."
|
| 158 |
+
}
|
| 159 |
+
],
|
| 160 |
+
"x_generator": {
|
| 161 |
+
"engine": "Vulnogram 0.1.0-dev"
|
| 162 |
+
}
|
| 163 |
+
},
|
| 164 |
+
"adp": [
|
| 165 |
+
{
|
| 166 |
+
"providerMetadata": {
|
| 167 |
+
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
|
| 168 |
+
"shortName": "CVE",
|
| 169 |
+
"dateUpdated": "2024-08-02T04:54:32.569Z"
|
| 170 |
+
},
|
| 171 |
+
"title": "CVE Program Container",
|
| 172 |
+
"references": [
|
| 173 |
+
{
|
| 174 |
+
"url": "https://security.paloaltonetworks.com/CVE-2023-0001",
|
| 175 |
+
"tags": [
|
| 176 |
+
"x_transferred"
|
| 177 |
+
]
|
| 178 |
+
}
|
| 179 |
+
]
|
| 180 |
+
}
|
| 181 |
+
]
|
| 182 |
+
}
|
| 183 |
+
}
|
vulnerability_assessment/vulnerability_assessment_processed.csv
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:0922f41998bacd920758a891f74b889b99224fff5cd4898ee5b192c0738dcf82
|
| 3 |
+
size 18149811
|