-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
GSD-automation
committed
Mar 29, 2024
1 parent
9552c08
commit 1b92303
Showing
182 changed files
with
8,359 additions
and
536 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -110,147 +110,148 @@ | |
} | ||
}, | ||
"nvd.nist.gov": { | ||
"configurations": { | ||
"CVE_data_version": "4.0", | ||
"nodes": [ | ||
"cve": { | ||
"configurations": [ | ||
{ | ||
"children": [], | ||
"cpe_match": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:mod_dav_svn:-:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
"nodes": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
"cpeMatch": [ | ||
{ | ||
"criteria": "cpe:2.3:a:apache:mod_dav_svn:-:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "EF1F71DC-F66A-4F20-AF88-636DEFBD30BB", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", | ||
"vulnerable": true | ||
} | ||
], | ||
"negate": false, | ||
"operator": "OR" | ||
} | ||
], | ||
"operator": "OR" | ||
] | ||
} | ||
] | ||
}, | ||
"cve": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2013-4558" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "en", | ||
"value": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /." | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "La funci\u00f3n get_parent_resource en respos.c en el m\u00f3dulo de servidor mod_dav_svn Apache HTTPD en Subversion 1.7.11 a 1.7.13 y 1.8.1 a 1.8.4, cuando se construyen con aserciones activas y SVNAutoversioning est\u00e1 habilitado, permite a atacantes remotos causar denegaci\u00f3n de servicio (fallo de aserci\u00f3n y aborto de proceso Apache) a trav\u00e9s de una URL no can\u00f3nica en una petici\u00f3n, como se muestra utilizando una '/' final." | ||
} | ||
], | ||
"id": "CVE-2013-4558", | ||
"lastModified": "2024-03-28T14:15:13.023", | ||
"metrics": { | ||
"cvssMetricV2": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-20" | ||
} | ||
] | ||
"acInsufInfo": false, | ||
"baseSeverity": "LOW", | ||
"cvssData": { | ||
"accessComplexity": "MEDIUM", | ||
"accessVector": "NETWORK", | ||
"authentication": "SINGLE", | ||
"availabilityImpact": "PARTIAL", | ||
"baseScore": 3.5, | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "NONE", | ||
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", | ||
"version": "2.0" | ||
}, | ||
"exploitabilityScore": 6.8, | ||
"impactScore": 2.9, | ||
"obtainAllPrivilege": false, | ||
"obtainOtherPrivilege": false, | ||
"obtainUserPrivilege": false, | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"userInteractionRequired": false | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "100363", | ||
"refsource": "OSVDB", | ||
"tags": [], | ||
"url": "http://osvdb.org/100363" | ||
}, | ||
{ | ||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431", | ||
"refsource": "CONFIRM", | ||
"tags": [], | ||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" | ||
}, | ||
{ | ||
"name": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt", | ||
"refsource": "CONFIRM", | ||
"tags": [ | ||
"Patch", | ||
"Vendor Advisory" | ||
], | ||
"url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" | ||
}, | ||
{ | ||
"name": "openSUSE-SU-2013:1860", | ||
"refsource": "SUSE", | ||
"tags": [], | ||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" | ||
}, | ||
{ | ||
"name": "openSUSE-SU-2013:1836", | ||
"refsource": "SUSE", | ||
"tags": [], | ||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" | ||
} | ||
] | ||
} | ||
}, | ||
"impact": { | ||
"baseMetricV2": { | ||
"cvssV2": { | ||
"accessComplexity": "MEDIUM", | ||
"accessVector": "NETWORK", | ||
"authentication": "SINGLE", | ||
"availabilityImpact": "PARTIAL", | ||
"baseScore": 3.5, | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "NONE", | ||
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", | ||
"version": "2.0" | ||
"published": "2013-12-07T20:55:02.553", | ||
"references": [ | ||
{ | ||
"source": "[email protected]", | ||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" | ||
}, | ||
"exploitabilityScore": 6.8, | ||
"impactScore": 2.9, | ||
"obtainAllPrivilege": false, | ||
"obtainOtherPrivilege": false, | ||
"obtainUserPrivilege": false, | ||
"severity": "LOW", | ||
"userInteractionRequired": false | ||
} | ||
}, | ||
"lastModifiedDate": "2013-12-20T04:36Z", | ||
"publishedDate": "2013-12-07T20:55Z" | ||
{ | ||
"source": "[email protected]", | ||
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "http://osvdb.org/100363" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Patch", | ||
"Vendor Advisory" | ||
], | ||
"url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://github.com/apache/subversion/commit/2c77c43e4255555f3b79f761f0d141393a3856cc" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://github.com/apache/subversion/commit/647e3f8365a74831bb915f63793b63e31fae062d" | ||
} | ||
], | ||
"sourceIdentifier": "[email protected]", | ||
"vulnStatus": "Modified", | ||
"weaknesses": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "CWE-20" | ||
} | ||
], | ||
"source": "[email protected]", | ||
"type": "Primary" | ||
} | ||
] | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.