mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-07-26T20:00:17.390575+00:00
This commit is contained in:
parent
3fadace4ff
commit
040ddfca67
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-0878",
|
"id": "CVE-2020-0878",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2020-09-11T17:15:14.370",
|
"published": "2020-09-11T17:15:14.370",
|
||||||
"lastModified": "2024-04-16T19:22:42.250",
|
"lastModified": "2024-07-26T19:54:32.770",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -121,73 +121,53 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468"
|
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2"
|
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2"
|
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4"
|
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
|
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
|
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
|
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
|
|
||||||
"matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
|
|
||||||
"matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
@ -196,13 +176,8 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
@ -219,21 +194,6 @@
|
|||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||||
@ -263,13 +223,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -293,46 +248,6 @@
|
|||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
|
|
||||||
"matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
|
|
||||||
"matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "507EB48C-F479-424C-8ABA-C279AB4FE3F4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
||||||
@ -340,74 +255,44 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE"
|
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106"
|
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793"
|
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619"
|
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
|
||||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": false,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-1380",
|
"id": "CVE-2020-1380",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2020-08-17T19:15:14.553",
|
"published": "2020-08-17T19:15:14.553",
|
||||||
"lastModified": "2024-01-19T00:15:10.350",
|
"lastModified": "2024-07-26T19:55:41.693",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -46,19 +46,19 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "HIGH",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "REQUIRED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact": "HIGH",
|
||||||
"integrityImpact": "HIGH",
|
"integrityImpact": "HIGH",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact": "HIGH",
|
||||||
"baseScore": 7.5,
|
"baseScore": 8.8,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 1.6,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
@ -121,43 +121,43 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
|
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
|
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
|
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": false,
|
"vulnerable": false,
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-1464",
|
"id": "CVE-2020-1464",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2020-08-17T19:15:14.867",
|
"published": "2020-08-17T19:15:14.867",
|
||||||
"lastModified": "2024-01-19T00:15:10.790",
|
"lastModified": "2024-07-26T19:55:33.947",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -109,43 +109,43 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
|
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
|
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
|
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
@ -162,6 +162,21 @@
|
|||||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "ADE7E7B1-64AC-4986-A50B-0918A42C05BB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "62224791-644C-4D1F-AD77-56B16CF27630"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||||
@ -187,21 +202,6 @@
|
|||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||||
@ -224,12 +224,17 @@
|
|||||||
"url": "https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/",
|
"url": "https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Issue Tracking",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd",
|
"url": "https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd",
|
||||||
"source": "secure@microsoft.com"
|
"source": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1464",
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1464",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-16846",
|
"id": "CVE-2020-16846",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2020-11-06T08:15:13.283",
|
"published": "2020-11-06T08:15:13.283",
|
||||||
"lastModified": "2023-11-07T03:19:07.447",
|
"lastModified": "2024-07-26T19:53:20.137",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -181,6 +181,11 @@
|
|||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:saltstack:salt:3001:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "74CAD70E-E77C-4010-B224-CEE3968CB6A2"
|
"matchCriteriaId": "74CAD70E-E77C-4010-B224-CEE3968CB6A2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:saltstack:salt:3002:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F5D7215A-820E-446C-844C-DC4C61BD1884"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -205,6 +210,21 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
@ -212,6 +232,7 @@
|
|||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html",
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00029.html",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -219,6 +240,7 @@
|
|||||||
"url": "http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html",
|
"url": "http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
"Third Party Advisory",
|
"Third Party Advisory",
|
||||||
"VDB Entry"
|
"VDB Entry"
|
||||||
]
|
]
|
||||||
@ -227,7 +249,7 @@
|
|||||||
"url": "https://github.com/saltstack/salt/releases",
|
"url": "https://github.com/saltstack/salt/releases",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Third Party Advisory"
|
"Release Notes"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -248,7 +270,10 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TPOGB2F6XUAIGFDTOCQDNB2VIXFXHWMA/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.gentoo.org/glsa/202011-13",
|
"url": "https://security.gentoo.org/glsa/202011-13",
|
||||||
@ -261,6 +286,7 @@
|
|||||||
"url": "https://www.debian.org/security/2021/dsa-4837",
|
"url": "https://www.debian.org/security/2021/dsa-4837",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -268,6 +294,7 @@
|
|||||||
"url": "https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/",
|
"url": "https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-17144",
|
"id": "CVE-2020-17144",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2020-12-10T00:15:16.120",
|
"published": "2020-12-10T00:15:16.120",
|
||||||
"lastModified": "2023-12-30T00:15:16.830",
|
"lastModified": "2024-07-26T19:53:06.077",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -46,20 +46,20 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "HIGH",
|
"privilegesRequired": "LOW",
|
||||||
"userInteraction": "REQUIRED",
|
"userInteraction": "NONE",
|
||||||
"scope": "CHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact": "HIGH",
|
||||||
"integrityImpact": "HIGH",
|
"integrityImpact": "HIGH",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact": "HIGH",
|
||||||
"baseScore": 8.4,
|
"baseScore": 8.8,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 1.7,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 6.0
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-25213",
|
"id": "CVE-2020-25213",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2020-09-09T16:15:12.127",
|
"published": "2020-09-09T16:15:12.127",
|
||||||
"lastModified": "2023-04-03T20:15:07.003",
|
"lastModified": "2024-07-26T19:54:54.537",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -130,7 +130,12 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html",
|
"url": "http://packetstormsecurity.com/files/171650/WordPress-File-Manager-6.9-Shell-Upload.html",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/w4fz5uck5/wp-file-manager-0day",
|
"url": "https://github.com/w4fz5uck5/wp-file-manager-0day",
|
||||||
@ -151,8 +156,7 @@
|
|||||||
"url": "https://plugins.trac.wordpress.org/changeset/2373068",
|
"url": "https://plugins.trac.wordpress.org/changeset/2373068",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Patch",
|
"Patch"
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -176,15 +180,14 @@
|
|||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Product",
|
"Product",
|
||||||
"Third Party Advisory"
|
"Release Notes"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/",
|
"url": "https://zdnet.com/article/millions-of-wordpress-sites-are-being-probed-attacked-with-recent-plugin-bug/",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Press/Media Coverage",
|
"Press/Media Coverage"
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-29583",
|
"id": "CVE-2020-29583",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2020-12-22T22:15:14.443",
|
"published": "2020-12-22T22:15:14.443",
|
||||||
"lastModified": "2023-11-07T03:21:32.250",
|
"lastModified": "2024-07-26T19:46:46.690",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -485,39 +485,450 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:atp100_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7DC9FE97-6B7D-41E8-879C-572B23CB1105"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7F7654A1-3806-41C7-82D4-46B0CD7EE53B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:atp100w_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "61489A79-AAF5-4347-9E10-73F139D30EE2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "47398FD0-6C5E-4625-9EFD-DE08C9AB7DB2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:atp200_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BB876002-669D-4052-B1B0-DA8F0B4EC500"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D68A36FF-8CAF-401C-9F18-94F3A2405CF4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:atp500_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3E6231DF-ADB3-43A9-AC3B-C72905584B05"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2818E8AC-FFEE-4DF9-BF3F-C75166C0E851"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:atp700_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DEDC5E3D-2103-4545-8611-B1C49B4B5BAB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0B41F437-855B-4490-8011-DF59887BE6D5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:atp800_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "246B2EF8-6412-4E69-91A5-B394BF4D299F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66B99746-0589-46E6-9CBD-F38619AD97DC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:vpn50_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F6A568BA-58D3-400C-9742-8E966C90D83E"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "9E3AC823-0ECA-42D8-8312-2FBE5914E4C0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:vpn100_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "65E48F65-A408-4A93-BBBC-44D5054D9841"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "81D90A7B-174F-40A1-8AF4-08B15B7BAC40"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:vpn300_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1B2E5F78-7F7B-46BA-A7B1-0A49F4A6509D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3C45C303-1A95-4245-B242-3AB9B9106CD4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:vpn1000_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E39AE158-E577-403B-867E-CCD5F8EE5FC5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "EECD311A-4E96-4576-AADF-47291EDE3559"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:usg_flex_100_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "14484416-6575-4E23-96A7-F37936F75BAB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2B30A4C0-9928-46AD-9210-C25656FB43FB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:usg_flex_100w_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A0597006-8FA7-4622-9C13-AFE9767CADE5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D74ABA7E-AA78-4A13-A64E-C44021591B42"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:usg_flex_200_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28D39C78-DD5A-47FB-9590-B79AABA1038B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F93B6A06-2951-46D2-A7E1-103D7318D612"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:usg_flex_500_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "438B93F0-7CBF-49E9-B556-CFEFE2E6EED0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "92C697A5-D1D3-4FF0-9C43-D27B18181958"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:zyxel:usg_flex_700_firmware:4.60:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "414BCC73-277B-48FD-8273-B33A780806D0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "9D1396E3-731B-4D05-A3F8-F3ABB80D5C29"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://ftp.zyxel.com/USG40/firmware/USG40_4.60%28AALA.1%29C0_2.pdf",
|
"url": "http://ftp.zyxel.com/USG40/firmware/USG40_4.60%28AALA.1%29C0_2.pdf",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release",
|
"url": "https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15",
|
"url": "https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html",
|
"url": "https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/",
|
"url": "https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.zyxel.com/support/CVE-2020-29583.shtml",
|
"url": "https://www.zyxel.com/support/CVE-2020-29583.shtml",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-3566",
|
"id": "CVE-2020-3566",
|
||||||
"sourceIdentifier": "ykramarz@cisco.com",
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
"published": "2020-08-29T16:15:09.797",
|
"published": "2020-08-29T16:15:09.797",
|
||||||
"lastModified": "2023-11-07T03:22:55.183",
|
"lastModified": "2024-07-26T19:55:20.327",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2022-05-03",
|
"cisaActionDue": "2022-05-03",
|
||||||
@ -26,20 +26,20 @@
|
|||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "NONE",
|
||||||
"scope": "UNCHANGED",
|
"scope": "CHANGED",
|
||||||
"confidentialityImpact": "NONE",
|
"confidentialityImpact": "NONE",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact": "HIGH",
|
||||||
"baseScore": 7.5,
|
"baseScore": 8.6,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 4.0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "ykramarz@cisco.com",
|
"source": "ykramarz@cisco.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-30632",
|
"id": "CVE-2021-30632",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2021-10-08T21:15:07.603",
|
"published": "2021-10-08T21:15:07.603",
|
||||||
"lastModified": "2023-11-07T03:33:25.690",
|
"lastModified": "2024-07-26T19:39:23.077",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -121,31 +121,39 @@
|
|||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html",
|
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
|
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://crbug.com/1247763",
|
"url": "https://crbug.com/1247763",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Permissions Required",
|
"Permissions Required"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-30633",
|
"id": "CVE-2021-30633",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2021-10-08T21:15:07.650",
|
"published": "2021-10-08T21:15:07.650",
|
||||||
"lastModified": "2023-11-07T03:33:26.037",
|
"lastModified": "2024-07-26T19:39:19.137",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -123,25 +123,29 @@
|
|||||||
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
|
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://crbug.com/1247766",
|
"url": "https://crbug.com/1247766",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Permissions Required",
|
"Permissions Required"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-31207",
|
"id": "CVE-2021-31207",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-05-11T19:15:10.397",
|
"published": "2021-05-11T19:15:10.397",
|
||||||
"lastModified": "2023-08-08T14:21:49.707",
|
"lastModified": "2024-07-26T19:25:27.687",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -46,19 +46,19 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "HIGH",
|
||||||
"privilegesRequired": "HIGH",
|
"privilegesRequired": "HIGH",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "NONE",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact": "HIGH",
|
||||||
"integrityImpact": "HIGH",
|
"integrityImpact": "HIGH",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact": "HIGH",
|
||||||
"baseScore": 7.2,
|
"baseScore": 6.6,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 0.7,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-31979",
|
"id": "CVE-2021-31979",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-07-14T18:15:09.597",
|
"published": "2021-07-14T18:15:09.597",
|
||||||
"lastModified": "2023-12-28T23:15:14.937",
|
"lastModified": "2024-07-26T19:25:37.813",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -107,26 +107,6 @@
|
|||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
||||||
@ -134,13 +114,45 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"versionEndExcluding": "10.0.10240.19003",
|
||||||
|
"matchCriteriaId": "0C51CD3A-E78B-4A0D-8716-4F2C0A79ED68"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"versionEndExcluding": "10.0.14393.4530",
|
||||||
|
"matchCriteriaId": "9EEBF8AC-AB6E-4F62-811A-0E53721C78F5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.17763.2061",
|
||||||
|
"matchCriteriaId": "5BAABE12-C0E8-4E34-9EFE-18DD50C54B1D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.18363.1679",
|
||||||
|
"matchCriteriaId": "1C9E359B-5719-48B1-BABB-618744C73388"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.19041.1110",
|
||||||
|
"matchCriteriaId": "307C13CF-563B-46D1-9F2E-227AB9C40720"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.19042.1110",
|
||||||
|
"matchCriteriaId": "9AEC53C7-C1CB-4FFB-8069-27604FB50F0B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.19043.1110",
|
||||||
|
"matchCriteriaId": "765BA052-1B41-4CD3-98E6-F3750E0466E5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
@ -157,6 +169,12 @@
|
|||||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.19041.1110",
|
||||||
|
"matchCriteriaId": "A73D95E0-7290-4049-ACA6-7071B6ECAB8D"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||||
@ -179,23 +197,21 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"versionEndExcluding": "10.0.14393.4530",
|
||||||
|
"matchCriteriaId": "9127CF36-6B37-4698-BB02-2AC6D853EB6F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
|
"versionEndExcluding": "10.0.17763.2061",
|
||||||
|
"matchCriteriaId": "77FA5A89-9F88-48FB-B632-76433EDBA95F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
"versionEndExcluding": "10.0.19042.1110",
|
||||||
},
|
"matchCriteriaId": "C210CB34-3DA4-4273-BF7C-F2692173E180"
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-33771",
|
"id": "CVE-2021-33771",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-07-14T18:15:10.483",
|
"published": "2021-07-14T18:15:10.483",
|
||||||
"lastModified": "2023-12-28T23:15:21.240",
|
"lastModified": "2024-07-26T19:25:47.657",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -109,38 +109,45 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
"versionEndExcluding": "10.0.10240.19003",
|
||||||
|
"matchCriteriaId": "0C51CD3A-E78B-4A0D-8716-4F2C0A79ED68"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
|
"versionEndExcluding": "10.0.14393.4530",
|
||||||
|
"matchCriteriaId": "9EEBF8AC-AB6E-4F62-811A-0E53721C78F5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
|
"versionEndExcluding": "10.0.17763.2061",
|
||||||
|
"matchCriteriaId": "5BAABE12-C0E8-4E34-9EFE-18DD50C54B1D"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
"versionEndExcluding": "10.0.18363.1679",
|
||||||
|
"matchCriteriaId": "1C9E359B-5719-48B1-BABB-618744C73388"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
"versionEndExcluding": "10.0.19041.1110",
|
||||||
|
"matchCriteriaId": "307C13CF-563B-46D1-9F2E-227AB9C40720"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"versionEndExcluding": "10.0.19042.1110",
|
||||||
|
"matchCriteriaId": "9AEC53C7-C1CB-4FFB-8069-27604FB50F0B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"versionEndExcluding": "10.0.19043.1110",
|
||||||
|
"matchCriteriaId": "765BA052-1B41-4CD3-98E6-F3750E0466E5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
@ -152,6 +159,12 @@
|
|||||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.19041.1110",
|
||||||
|
"matchCriteriaId": "A73D95E0-7290-4049-ACA6-7071B6ECAB8D"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:x64:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:x64:*",
|
||||||
@ -169,23 +182,21 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"versionEndExcluding": "10.0.14393.4530",
|
||||||
|
"matchCriteriaId": "9127CF36-6B37-4698-BB02-2AC6D853EB6F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
|
"versionEndExcluding": "10.0.17763.2061",
|
||||||
|
"matchCriteriaId": "77FA5A89-9F88-48FB-B632-76433EDBA95F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
"versionEndExcluding": "10.0.19042.1110",
|
||||||
},
|
"matchCriteriaId": "C210CB34-3DA4-4273-BF7C-F2692173E180"
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-34448",
|
"id": "CVE-2021-34448",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-07-16T21:15:09.580",
|
"published": "2021-07-16T21:15:09.580",
|
||||||
"lastModified": "2023-12-28T23:15:27.633",
|
"lastModified": "2024-07-26T19:26:11.723",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -109,38 +109,45 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
"versionEndExcluding": "10.0.10240.19003",
|
||||||
|
"matchCriteriaId": "0C51CD3A-E78B-4A0D-8716-4F2C0A79ED68"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
|
"versionEndExcluding": "10.0.14393.4530",
|
||||||
|
"matchCriteriaId": "9EEBF8AC-AB6E-4F62-811A-0E53721C78F5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
|
"versionEndExcluding": "10.0.17763.2061",
|
||||||
|
"matchCriteriaId": "5BAABE12-C0E8-4E34-9EFE-18DD50C54B1D"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
"versionEndExcluding": "10.0.18363.1679",
|
||||||
|
"matchCriteriaId": "1C9E359B-5719-48B1-BABB-618744C73388"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
"versionEndExcluding": "10.0.19041.1110",
|
||||||
|
"matchCriteriaId": "307C13CF-563B-46D1-9F2E-227AB9C40720"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"versionEndExcluding": "10.0.19042.1110",
|
||||||
|
"matchCriteriaId": "9AEC53C7-C1CB-4FFB-8069-27604FB50F0B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"versionEndExcluding": "10.0.19043.1110",
|
||||||
|
"matchCriteriaId": "765BA052-1B41-4CD3-98E6-F3750E0466E5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
@ -174,13 +181,15 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"versionEndExcluding": "10.0.14393.4530",
|
||||||
|
"matchCriteriaId": "9127CF36-6B37-4698-BB02-2AC6D853EB6F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
"versionEndExcluding": "10.0.17763.2061",
|
||||||
|
"matchCriteriaId": "77FA5A89-9F88-48FB-B632-76433EDBA95F"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-34473",
|
"id": "CVE-2021-34473",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-07-14T18:15:11.163",
|
"published": "2021-07-14T18:15:11.163",
|
||||||
"lastModified": "2023-12-28T23:15:32.450",
|
"lastModified": "2024-07-26T19:26:02.790",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-36741",
|
"id": "CVE-2021-36741",
|
||||||
"sourceIdentifier": "security@trendmicro.com",
|
"sourceIdentifier": "security@trendmicro.com",
|
||||||
"published": "2021-07-29T20:15:07.620",
|
"published": "2021-07-29T20:15:07.620",
|
||||||
"lastModified": "2023-11-07T03:36:47.957",
|
"lastModified": "2024-07-26T19:26:16.980",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -12,7 +12,7 @@
|
|||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product\ufffds management console in order to exploit this vulnerability."
|
"value": "An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -139,6 +139,7 @@
|
|||||||
"url": "https://success.trendmicro.com/jp/solution/000287796",
|
"url": "https://success.trendmicro.com/jp/solution/000287796",
|
||||||
"source": "security@trendmicro.com",
|
"source": "security@trendmicro.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -146,6 +147,7 @@
|
|||||||
"url": "https://success.trendmicro.com/jp/solution/000287815",
|
"url": "https://success.trendmicro.com/jp/solution/000287815",
|
||||||
"source": "security@trendmicro.com",
|
"source": "security@trendmicro.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -153,6 +155,7 @@
|
|||||||
"url": "https://success.trendmicro.com/solution/000287819",
|
"url": "https://success.trendmicro.com/solution/000287819",
|
||||||
"source": "security@trendmicro.com",
|
"source": "security@trendmicro.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -160,6 +163,7 @@
|
|||||||
"url": "https://success.trendmicro.com/solution/000287820",
|
"url": "https://success.trendmicro.com/solution/000287820",
|
||||||
"source": "security@trendmicro.com",
|
"source": "security@trendmicro.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Broken Link",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-36942",
|
"id": "CVE-2021-36942",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-08-12T18:15:10.000",
|
"published": "2021-08-12T18:15:10.000",
|
||||||
"lastModified": "2023-12-28T20:15:52.970",
|
"lastModified": "2024-07-26T19:29:48.297",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -46,20 +46,20 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "NONE",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "NONE",
|
"confidentialityImpact": "NONE",
|
||||||
"integrityImpact": "LOW",
|
"integrityImpact": "HIGH",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"baseScore": 5.3,
|
"baseScore": 7.5,
|
||||||
"baseSeverity": "MEDIUM"
|
"baseSeverity": "HIGH"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 1.4
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -107,6 +107,12 @@
|
|||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "10.0.19041.1165",
|
||||||
|
"matchCriteriaId": "C90BEC5F-E0A8-43C5-BB0D-251D19BFD66B"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||||
@ -129,23 +135,21 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
"versionEndExcluding": "10.0.14393.4583",
|
||||||
|
"matchCriteriaId": "11769DC8-BD9F-4526-8B53-5380327930FB"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
|
"versionEndExcluding": "10.0.17763.2114",
|
||||||
|
"matchCriteriaId": "61219C24-A1AE-427F-BBF8-A984BCB1CA6F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
"versionEndExcluding": "10.0.19042.1165",
|
||||||
},
|
"matchCriteriaId": "45A85E4C-6C7A-4B72-832D-AC12A78565C3"
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-36948",
|
"id": "CVE-2021-36948",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2021-08-12T18:15:10.190",
|
"published": "2021-08-12T18:15:10.190",
|
||||||
"lastModified": "2023-12-28T20:15:54.010",
|
"lastModified": "2024-07-26T19:30:11.347",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -109,43 +109,51 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "9E2C378B-1507-4C81-82F6-9F599616845A"
|
"versionEndExcluding": "10.0.17763.2114",
|
||||||
|
"matchCriteriaId": "F8D40D82-1D88-4CF1-B961-F9F28426C56B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FAE4278F-71A7-43E9-8F79-1CBFAE71D730"
|
"versionEndExcluding": "10.0.18363.1734",
|
||||||
|
"matchCriteriaId": "3DD2BDE6-67C6-48E2-BED0-12E4CC7EE6BC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
"versionEndExcluding": "10.0.19041.1165",
|
||||||
|
"matchCriteriaId": "70336A6A-DE45-4604-BE81-10DA4DF12D3F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372"
|
"versionEndExcluding": "10.0.19042.1165",
|
||||||
|
"matchCriteriaId": "7AB7321A-1F89-48B3-8E5A-94791AB2BC86"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8"
|
"versionEndExcluding": "10.0.19043.1165",
|
||||||
|
"matchCriteriaId": "2A860F2B-0533-46F7-879E-B932E4E44F0D"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"
|
"versionEndExcluding": "10.0.19041.1165",
|
||||||
|
"matchCriteriaId": "C90BEC5F-E0A8-43C5-BB0D-251D19BFD66B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"
|
"versionEndExcluding": "10.0.17763.2114",
|
||||||
|
"matchCriteriaId": "61219C24-A1AE-427F-BBF8-A984BCB1CA6F"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
|
"versionEndExcluding": "10.0.19042.1165",
|
||||||
|
"matchCriteriaId": "45A85E4C-6C7A-4B72-832D-AC12A78565C3"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-37973",
|
"id": "CVE-2021-37973",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2021-10-08T22:15:08.287",
|
"published": "2021-10-08T22:15:08.287",
|
||||||
"lastModified": "2024-02-15T02:00:01.650",
|
"lastModified": "2024-07-26T19:39:05.947",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -143,8 +143,7 @@
|
|||||||
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html",
|
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -158,16 +157,23 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2022/dsa-5046",
|
"url": "https://www.debian.org/security/2022/dsa-5046",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-37975",
|
"id": "CVE-2021-37975",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2021-10-08T22:15:08.373",
|
"published": "2021-10-08T22:15:08.373",
|
||||||
"lastModified": "2023-11-07T03:37:06.463",
|
"lastModified": "2024-07-26T19:38:59.427",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -146,40 +146,52 @@
|
|||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html",
|
"url": "http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html",
|
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://crbug.com/1252918",
|
"url": "https://crbug.com/1252918",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Permissions Required",
|
"Permissions Required"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2022/dsa-5046",
|
"url": "https://www.debian.org/security/2022/dsa-5046",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-37976",
|
"id": "CVE-2021-37976",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2021-10-08T22:15:08.417",
|
"published": "2021-10-08T22:15:08.417",
|
||||||
"lastModified": "2023-11-07T03:37:06.683",
|
"lastModified": "2024-07-26T19:38:29.753",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -148,34 +148,44 @@
|
|||||||
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html",
|
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Release Notes",
|
"Release Notes"
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://crbug.com/1251787",
|
"url": "https://crbug.com/1251787",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Permissions Required",
|
"Exploit",
|
||||||
|
"Issue Tracking",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.debian.org/security/2022/dsa-5046",
|
"url": "https://www.debian.org/security/2022/dsa-5046",
|
||||||
"source": "chrome-cve-admin@google.com",
|
"source": "chrome-cve-admin@google.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-41773",
|
"id": "CVE-2021-41773",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2021-10-05T09:15:07.593",
|
"published": "2021-10-05T09:15:07.593",
|
||||||
"lastModified": "2023-11-07T03:39:00.550",
|
"lastModified": "2024-07-26T19:40:13.757",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -316,36 +316,59 @@
|
|||||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Release Notes",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/r6abf5f2ba6f1aa8b1030f95367aaf17660c4e4c78cb2338aee18982f%40%3Cusers.httpd.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/r98d704ed4377ed889d40479db79ed1ee2f43b2ebdd79ce84b042df45%40%3Cannounce.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.gentoo.org/glsa/202208-20",
|
"url": "https://security.gentoo.org/glsa/202208-20",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-42013",
|
"id": "CVE-2021-42013",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2021-10-07T16:15:09.270",
|
"published": "2021-10-07T16:15:09.270",
|
||||||
"lastModified": "2023-11-07T03:39:05.670",
|
"lastModified": "2024-07-26T19:39:26.967",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2021-11-03",
|
"cisaExploitAdd": "2021-11-03",
|
||||||
"cisaActionDue": "2021-11-17",
|
"cisaActionDue": "2021-11-17",
|
||||||
@ -341,28 +341,45 @@
|
|||||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Release Notes",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/r17a4c6ce9aff662efd9459e9d1850ab4a611cb23392fc68264c72cb3%40%3Ccvs.httpd.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/r7c795cd45a3384d4d27e57618a215b0ed19cb6ca8eb070061ad5d837%40%3Cannounce.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E",
|
"url": "https://lists.apache.org/thread.html/rb5b0e46f179f60b0c70204656bc52fcb558e961cb4d06a971e9e3efb%40%3Cusers.httpd.apache.org%3E",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RMIIEFINL6FUIOPD2A3M5XC6DH45Y3CC/",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS5RVHOIIRECG65ZBTZY7IEJVWQSQPG3/",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.gentoo.org/glsa/202208-20",
|
"url": "https://security.gentoo.org/glsa/202208-20",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-45168",
|
"id": "CVE-2022-45168",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-10T15:15:50.600",
|
"published": "2024-06-10T15:15:50.600",
|
||||||
"lastModified": "2024-06-10T18:06:22.600",
|
"lastModified": "2024-07-26T19:03:18.167",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en LIVEBOX Collaboration vDesk hasta v018. Se puede omitir la autenticaci\u00f3n de dos factores en el endpoint /login/backup_code y en el endpoint /api/v1/vdeskintegration/createbackupcodes, porque la aplicaci\u00f3n permite al usuario generar o regenerar los c\u00f3digos de respaldo antes de verificar el TOTP."
|
"value": "Se descubri\u00f3 un problema en LIVEBOX Collaboration vDesk hasta v018. Se puede omitir la autenticaci\u00f3n de dos factores en el endpoint /login/backup_code y en el endpoint /api/v1/vdeskintegration/createbackupcodes, porque la aplicaci\u00f3n permite al usuario generar o regenerar los c\u00f3digos de respaldo antes de verificar el TOTP."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "cve@mitre.org"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "018",
|
||||||
|
"matchCriteriaId": "59F30C76-FDF5-4D2E-A3CE-33EAB97AB650"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-45171",
|
"id": "CVE-2022-45171",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-28T20:16:12.573",
|
"published": "2024-05-28T20:16:12.573",
|
||||||
"lastModified": "2024-05-29T13:02:09.280",
|
"lastModified": "2024-07-26T18:20:11.907",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en LIVEBOX Collaboration vDesk hasta v018. Se puede realizar una carga sin restricciones de un archivo con un tipo peligroso en la secci\u00f3n del sitio web de vShare. Un usuario remoto, autenticado en el producto, puede cargar arbitrariamente archivos potencialmente peligrosos sin restricciones."
|
"value": "Se descubri\u00f3 un problema en LIVEBOX Collaboration vDesk hasta v018. Se puede realizar una carga sin restricciones de un archivo con un tipo peligroso en la secci\u00f3n del sitio web de vShare. Un usuario remoto, autenticado en el producto, puede cargar arbitrariamente archivos potencialmente peligrosos sin restricciones."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "cve@mitre.org"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "018",
|
||||||
|
"matchCriteriaId": "59F30C76-FDF5-4D2E-A3CE-33EAB97AB650"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-45176",
|
"id": "CVE-2022-45176",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-06-10T15:15:50.687",
|
"published": "2024-06-10T15:15:50.687",
|
||||||
"lastModified": "2024-06-10T18:06:22.600",
|
"lastModified": "2024-07-26T18:03:21.673",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,68 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en LIVEBOX Collaboration vDesk hasta v018. Cross-site Scripting (XSS) Almacenado puede ocurrir en el endpoint /api/v1/getbodyfile a trav\u00e9s del par\u00e1metro uri. La aplicaci\u00f3n web (a trav\u00e9s de su secci\u00f3n de funcionalidad vShare) no verifica adecuadamente los par\u00e1metros, enviados en solicitudes HTTP como entrada, antes de guardarlos en el servidor. Adem\u00e1s, el contenido JavaScript manipulado puede reflejarse en el usuario final y ejecutarse mediante el navegador web."
|
"value": "Se descubri\u00f3 un problema en LIVEBOX Collaboration vDesk hasta v018. Cross-site Scripting (XSS) Almacenado puede ocurrir en el endpoint /api/v1/getbodyfile a trav\u00e9s del par\u00e1metro uri. La aplicaci\u00f3n web (a trav\u00e9s de su secci\u00f3n de funcionalidad vShare) no verifica adecuadamente los par\u00e1metros, enviados en solicitudes HTTP como entrada, antes de guardarlos en el servidor. Adem\u00e1s, el contenido JavaScript manipulado puede reflejarse en el usuario final y ejecutarse mediante el navegador web."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "cve@mitre.org"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "018",
|
||||||
|
"matchCriteriaId": "59F30C76-FDF5-4D2E-A3CE-33EAB97AB650"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-7248",
|
"id": "CVE-2023-7248",
|
||||||
"sourceIdentifier": "security@opentext.com",
|
"sourceIdentifier": "security@opentext.com",
|
||||||
"published": "2024-03-15T20:15:07.280",
|
"published": "2024-03-15T20:15:07.280",
|
||||||
"lastModified": "2024-03-17T22:38:29.433",
|
"lastModified": "2024-07-26T19:11:49.893",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@opentext.com",
|
"source": "security@opentext.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security@opentext.com",
|
"source": "security@opentext.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,46 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.microfocus.com/s/article/KM000027542?language=en_US",
|
"nodes": [
|
||||||
"source": "security@opentext.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "10.0.0-0",
|
||||||
|
"versionEndIncluding": "10.1.1-26",
|
||||||
|
"matchCriteriaId": "056D6A40-95C6-4FEA-91C9-B5C41AE254C4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "11.0.0-0",
|
||||||
|
"versionEndExcluding": "11.1.1-25",
|
||||||
|
"matchCriteriaId": "C15386AE-A142-4A50-9B64-276C2FC3E959"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:opentext:vertica:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "12.0.0-0",
|
||||||
|
"versionEndExcluding": "12.0.4-19",
|
||||||
|
"matchCriteriaId": "84FC2248-AAC2-4994-BBB3-6705EAB9934B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://portal.microfocus.com/s/article/KM000027542?language=en_US",
|
||||||
|
"source": "security@opentext.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,41 @@
|
|||||||
"id": "CVE-2023-7271",
|
"id": "CVE-2023-7271",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2024-07-25T12:15:02.207",
|
"published": "2024-07-25T12:15:02.207",
|
||||||
"lastModified": "2024-07-25T12:36:39.947",
|
"lastModified": "2024-07-26T18:19:28.000",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability."
|
"value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Vulnerabilidad de escalada de privilegios en NMS module Impact: la explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@huawei.com",
|
"source": "psirt@huawei.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@huawei.com",
|
"source": "psirt@huawei.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -47,10 +81,70 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
"nodes": [
|
||||||
"source": "psirt@huawei.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://consumer.huawei.com/en/support/bulletin/2024/7/",
|
||||||
|
"source": "psirt@huawei.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-31840",
|
"id": "CVE-2024-31840",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-21T16:15:25.943",
|
"published": "2024-05-21T16:15:25.943",
|
||||||
"lastModified": "2024-05-21T16:53:56.550",
|
"lastModified": "2024-07-26T19:12:02.190",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,71 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. La aplicaci\u00f3n web inserta contrase\u00f1as de texto plano en el c\u00f3digo fuente HTML. Un usuario autenticado puede editar la configuraci\u00f3n del servidor de correo electr\u00f3nico. Una vez que el usuario accede a la funci\u00f3n de edici\u00f3n, la aplicaci\u00f3n web completa el formulario de edici\u00f3n con las credenciales actuales de la cuenta de correo electr\u00f3nico, incluida la contrase\u00f1a en texto plano."
|
"value": "Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. La aplicaci\u00f3n web inserta contrase\u00f1as de texto plano en el c\u00f3digo fuente HTML. Un usuario autenticado puede editar la configuraci\u00f3n del servidor de correo electr\u00f3nico. Una vez que el usuario accede a la funci\u00f3n de edici\u00f3n, la aplicaci\u00f3n web completa el formulario de edici\u00f3n con las credenciales actuales de la cuenta de correo electr\u00f3nico, incluida la contrase\u00f1a en texto plano."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "cve@mitre.org"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-312"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-319"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3469B5CE-AB48-497A-94DF-820F97DB88B3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-31844",
|
"id": "CVE-2024-31844",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-21T16:15:26.027",
|
"published": "2024-05-21T16:15:26.027",
|
||||||
"lastModified": "2024-05-21T16:53:56.550",
|
"lastModified": "2024-07-26T18:21:23.027",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,67 @@
|
|||||||
"value": " Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. El servidor no maneja adecuadamente los errores de la aplicaci\u00f3n. En algunos casos, esto conduce a la divulgaci\u00f3n de informaci\u00f3n sobre el servidor. Un usuario no autenticado puede crear solicitudes espec\u00edficas para que la aplicaci\u00f3n genere un error. Dentro de un mensaje de error se revela cierta informaci\u00f3n sobre el servidor, como la ruta absoluta del c\u00f3digo fuente de la aplicaci\u00f3n. Este tipo de informaci\u00f3n puede ayudar a un atacante a realizar otros ataques contra el sistema. Esto se puede explotar sin autenticaci\u00f3n."
|
"value": " Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. El servidor no maneja adecuadamente los errores de la aplicaci\u00f3n. En algunos casos, esto conduce a la divulgaci\u00f3n de informaci\u00f3n sobre el servidor. Un usuario no autenticado puede crear solicitudes espec\u00edficas para que la aplicaci\u00f3n genere un error. Dentro de un mensaje de error se revela cierta informaci\u00f3n sobre el servidor, como la ruta absoluta del c\u00f3digo fuente de la aplicaci\u00f3n. Este tipo de informaci\u00f3n puede ayudar a un atacante a realizar otros ataques contra el sistema. Esto se puede explotar sin autenticaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "cve@mitre.org"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-209"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3469B5CE-AB48-497A-94DF-820F97DB88B3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-31847",
|
"id": "CVE-2024-31847",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-21T16:15:26.210",
|
"published": "2024-05-21T16:15:26.210",
|
||||||
"lastModified": "2024-05-21T16:53:56.550",
|
"lastModified": "2024-07-26T18:20:51.120",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,11 +15,67 @@
|
|||||||
"value": " Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. Una vulnerabilidad de Cross Site Scripting (XSS) almacenado permite a atacantes remotos autenticados y no autenticados inyectar scripts web o HTML de su elecci\u00f3n en un par\u00e1metro GET. Esto refleja/almacena la entrada del usuario sin sanitizaci\u00f3n."
|
"value": " Se descubri\u00f3 un problema en Italtel Embrace 1.6.4. Una vulnerabilidad de Cross Site Scripting (XSS) almacenado permite a atacantes remotos autenticados y no autenticados inyectar scripts web o HTML de su elecci\u00f3n en un par\u00e1metro GET. Esto refleja/almacena la entrada del usuario sin sanitizaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
"references": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
"source": "nvd@nist.gov",
|
||||||
"source": "cve@mitre.org"
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3469B5CE-AB48-497A-94DF-820F97DB88B3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2024/CVE-2024-388xx/CVE-2024-38871.json
Normal file
56
CVE-2024/CVE-2024-388xx/CVE-2024-38871.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-38871",
|
||||||
|
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||||
|
"published": "2024-07-26T18:15:03.137",
|
||||||
|
"lastModified": "2024-07-26T18:15:03.137",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Zohocorp ManageEngine Exchange Reporter Plus versions 5717 and below are vulnerable to the authenticated SQL injection in the reports module."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 8.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.manageengine.com/products/exchange-reports/advisory/CVE-2024-38871.html",
|
||||||
|
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-388xx/CVE-2024-38872.json
Normal file
56
CVE-2024/CVE-2024-388xx/CVE-2024-38872.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-38872",
|
||||||
|
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||||
|
"published": "2024-07-26T18:15:03.350",
|
||||||
|
"lastModified": "2024-07-26T18:15:03.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Zohocorp ManageEngine Exchange Reporter Plus versions 5717 and below are vulnerable to the authenticated SQL injection in the monitoring module."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 8.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.manageengine.com/products/exchange-reports/advisory/CVE-2024-38872.html",
|
||||||
|
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-393xx/CVE-2024-39304.json
Normal file
60
CVE-2024/CVE-2024-393xx/CVE-2024-39304.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39304",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-07-26T18:15:03.557",
|
||||||
|
"lastModified": "2024-07-26T18:15:03.557",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "ChurchCRM is an open-source church management system. Versions of the application prior to 5.9.2 are vulnerable to an authenticated SQL injection due to an improper sanitization of user input. Authentication is required, but no elevated privileges are necessary. This allows attackers to inject SQL statements directly into the database query due to inadequate sanitization of the EID parameter in in a GET request to `/GetText.php`. Version 5.9.2 patches the issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
44
CVE-2024/CVE-2024-420xx/CVE-2024-42007.json
Normal file
44
CVE-2024/CVE-2024-420xx/CVE-2024-42007.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42007",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-07-26T19:15:10.917",
|
||||||
|
"lastModified": "2024-07-26T19:15:10.917",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SPX (aka php-spx) through 0.4.15 allows SPX_UI_URI Directory Traversal to read arbitrary files."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/NoiseByNorthwest/php-spx/issues/251",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
README.md
56
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-26T18:00:17.596024+00:00
|
2024-07-26T20:00:17.390575+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-07-26T17:15:12.990000+00:00
|
2024-07-26T19:55:41.693000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,36 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
258033
|
258037
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `17`
|
Recently added CVEs: `4`
|
||||||
|
|
||||||
- [CVE-2023-50700](CVE-2023/CVE-2023-507xx/CVE-2023-50700.json) (`2024-07-26T17:15:10.803`)
|
- [CVE-2024-38871](CVE-2024/CVE-2024-388xx/CVE-2024-38871.json) (`2024-07-26T18:15:03.137`)
|
||||||
- [CVE-2024-24257](CVE-2024/CVE-2024-242xx/CVE-2024-24257.json) (`2024-07-26T17:15:11.173`)
|
- [CVE-2024-38872](CVE-2024/CVE-2024-388xx/CVE-2024-38872.json) (`2024-07-26T18:15:03.350`)
|
||||||
- [CVE-2024-26520](CVE-2024/CVE-2024-265xx/CVE-2024-26520.json) (`2024-07-26T17:15:11.507`)
|
- [CVE-2024-39304](CVE-2024/CVE-2024-393xx/CVE-2024-39304.json) (`2024-07-26T18:15:03.557`)
|
||||||
- [CVE-2024-27357](CVE-2024/CVE-2024-273xx/CVE-2024-27357.json) (`2024-07-26T17:15:11.580`)
|
- [CVE-2024-42007](CVE-2024/CVE-2024-420xx/CVE-2024-42007.json) (`2024-07-26T19:15:10.917`)
|
||||||
- [CVE-2024-27358](CVE-2024/CVE-2024-273xx/CVE-2024-27358.json) (`2024-07-26T17:15:11.650`)
|
|
||||||
- [CVE-2024-41353](CVE-2024/CVE-2024-413xx/CVE-2024-41353.json) (`2024-07-26T17:15:12.457`)
|
|
||||||
- [CVE-2024-41354](CVE-2024/CVE-2024-413xx/CVE-2024-41354.json) (`2024-07-26T17:15:12.513`)
|
|
||||||
- [CVE-2024-41355](CVE-2024/CVE-2024-413xx/CVE-2024-41355.json) (`2024-07-26T16:15:03.277`)
|
|
||||||
- [CVE-2024-41356](CVE-2024/CVE-2024-413xx/CVE-2024-41356.json) (`2024-07-26T16:15:03.357`)
|
|
||||||
- [CVE-2024-41357](CVE-2024/CVE-2024-413xx/CVE-2024-41357.json) (`2024-07-26T16:15:03.427`)
|
|
||||||
- [CVE-2024-41373](CVE-2024/CVE-2024-413xx/CVE-2024-41373.json) (`2024-07-26T17:15:12.573`)
|
|
||||||
- [CVE-2024-41374](CVE-2024/CVE-2024-413xx/CVE-2024-41374.json) (`2024-07-26T17:15:12.630`)
|
|
||||||
- [CVE-2024-41375](CVE-2024/CVE-2024-413xx/CVE-2024-41375.json) (`2024-07-26T17:15:12.690`)
|
|
||||||
- [CVE-2024-41807](CVE-2024/CVE-2024-418xx/CVE-2024-41807.json) (`2024-07-26T16:15:03.593`)
|
|
||||||
- [CVE-2024-41812](CVE-2024/CVE-2024-418xx/CVE-2024-41812.json) (`2024-07-26T17:15:12.783`)
|
|
||||||
- [CVE-2024-41813](CVE-2024/CVE-2024-418xx/CVE-2024-41813.json) (`2024-07-26T17:15:12.990`)
|
|
||||||
- [CVE-2024-7050](CVE-2024/CVE-2024-70xx/CVE-2024-7050.json) (`2024-07-26T16:15:03.847`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `31`
|
||||||
|
|
||||||
|
- [CVE-2020-29583](CVE-2020/CVE-2020-295xx/CVE-2020-29583.json) (`2024-07-26T19:46:46.690`)
|
||||||
|
- [CVE-2020-3566](CVE-2020/CVE-2020-35xx/CVE-2020-3566.json) (`2024-07-26T19:55:20.327`)
|
||||||
|
- [CVE-2021-30632](CVE-2021/CVE-2021-306xx/CVE-2021-30632.json) (`2024-07-26T19:39:23.077`)
|
||||||
|
- [CVE-2021-30633](CVE-2021/CVE-2021-306xx/CVE-2021-30633.json) (`2024-07-26T19:39:19.137`)
|
||||||
|
- [CVE-2021-31207](CVE-2021/CVE-2021-312xx/CVE-2021-31207.json) (`2024-07-26T19:25:27.687`)
|
||||||
|
- [CVE-2021-31979](CVE-2021/CVE-2021-319xx/CVE-2021-31979.json) (`2024-07-26T19:25:37.813`)
|
||||||
|
- [CVE-2021-33771](CVE-2021/CVE-2021-337xx/CVE-2021-33771.json) (`2024-07-26T19:25:47.657`)
|
||||||
|
- [CVE-2021-34448](CVE-2021/CVE-2021-344xx/CVE-2021-34448.json) (`2024-07-26T19:26:11.723`)
|
||||||
|
- [CVE-2021-34473](CVE-2021/CVE-2021-344xx/CVE-2021-34473.json) (`2024-07-26T19:26:02.790`)
|
||||||
|
- [CVE-2021-36741](CVE-2021/CVE-2021-367xx/CVE-2021-36741.json) (`2024-07-26T19:26:16.980`)
|
||||||
|
- [CVE-2021-36942](CVE-2021/CVE-2021-369xx/CVE-2021-36942.json) (`2024-07-26T19:29:48.297`)
|
||||||
|
- [CVE-2021-36948](CVE-2021/CVE-2021-369xx/CVE-2021-36948.json) (`2024-07-26T19:30:11.347`)
|
||||||
|
- [CVE-2021-37973](CVE-2021/CVE-2021-379xx/CVE-2021-37973.json) (`2024-07-26T19:39:05.947`)
|
||||||
|
- [CVE-2021-37975](CVE-2021/CVE-2021-379xx/CVE-2021-37975.json) (`2024-07-26T19:38:59.427`)
|
||||||
|
- [CVE-2021-37976](CVE-2021/CVE-2021-379xx/CVE-2021-37976.json) (`2024-07-26T19:38:29.753`)
|
||||||
|
- [CVE-2021-41773](CVE-2021/CVE-2021-417xx/CVE-2021-41773.json) (`2024-07-26T19:40:13.757`)
|
||||||
|
- [CVE-2021-42013](CVE-2021/CVE-2021-420xx/CVE-2021-42013.json) (`2024-07-26T19:39:26.967`)
|
||||||
|
- [CVE-2022-45168](CVE-2022/CVE-2022-451xx/CVE-2022-45168.json) (`2024-07-26T19:03:18.167`)
|
||||||
|
- [CVE-2022-45171](CVE-2022/CVE-2022-451xx/CVE-2022-45171.json) (`2024-07-26T18:20:11.907`)
|
||||||
|
- [CVE-2022-45176](CVE-2022/CVE-2022-451xx/CVE-2022-45176.json) (`2024-07-26T18:03:21.673`)
|
||||||
|
- [CVE-2023-7248](CVE-2023/CVE-2023-72xx/CVE-2023-7248.json) (`2024-07-26T19:11:49.893`)
|
||||||
|
- [CVE-2023-7271](CVE-2023/CVE-2023-72xx/CVE-2023-7271.json) (`2024-07-26T18:19:28.000`)
|
||||||
|
- [CVE-2024-31840](CVE-2024/CVE-2024-318xx/CVE-2024-31840.json) (`2024-07-26T19:12:02.190`)
|
||||||
|
- [CVE-2024-31844](CVE-2024/CVE-2024-318xx/CVE-2024-31844.json) (`2024-07-26T18:21:23.027`)
|
||||||
|
- [CVE-2024-31847](CVE-2024/CVE-2024-318xx/CVE-2024-31847.json) (`2024-07-26T18:20:51.120`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
100
_state.csv
100
_state.csv
@ -144942,7 +144942,7 @@ CVE-2020-0874,0,0,e70e04c34eaea3bc8c7f3fdf648a6ee0a313174121baf0a44ec12d8162fdf7
|
|||||||
CVE-2020-0875,0,0,9959a1e795981caa588b389b3ac5e32d09b6f40615f52fe15987944127992950,2023-12-31T22:15:46.170000
|
CVE-2020-0875,0,0,9959a1e795981caa588b389b3ac5e32d09b6f40615f52fe15987944127992950,2023-12-31T22:15:46.170000
|
||||||
CVE-2020-0876,0,0,82eb1e416a2caa34862d8590985ae77cbdf0e72757022c5e18f9980fc587cead,2021-07-21T11:39:23.747000
|
CVE-2020-0876,0,0,82eb1e416a2caa34862d8590985ae77cbdf0e72757022c5e18f9980fc587cead,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-0877,0,0,dfbf3f9261aed5714c5ff89fc0e6298563c1c33c92a959c356b05714cd0e7c91,2021-07-21T11:39:23.747000
|
CVE-2020-0877,0,0,dfbf3f9261aed5714c5ff89fc0e6298563c1c33c92a959c356b05714cd0e7c91,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-0878,0,0,5f01c4a232dfe95650ee907a9fb3bf3cb992fe1312e99626edcbd984805e9c07,2024-04-16T19:22:42.250000
|
CVE-2020-0878,0,1,9a3b911ac9c569c38870e66f8604d702ceeb762d567c6e4869fb9e5bd1cadb27,2024-07-26T19:54:32.770000
|
||||||
CVE-2020-0879,0,0,abd16ea130dadeaa6d29369a911941b894799e6c37fba299543042634627365e,2021-07-21T11:39:23.747000
|
CVE-2020-0879,0,0,abd16ea130dadeaa6d29369a911941b894799e6c37fba299543042634627365e,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-0880,0,0,de550d632177905436ea948e35bbac4a6893779a0624b0e4b3b213aadb0220a7,2021-07-21T11:39:23.747000
|
CVE-2020-0880,0,0,de550d632177905436ea948e35bbac4a6893779a0624b0e4b3b213aadb0220a7,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-0881,0,0,1816ff899d0609b5c19216da3cb190fc6719da9dcc7628f55e81affa812049c9,2021-07-21T11:39:23.747000
|
CVE-2020-0881,0,0,1816ff899d0609b5c19216da3cb190fc6719da9dcc7628f55e81affa812049c9,2021-07-21T11:39:23.747000
|
||||||
@ -148580,7 +148580,7 @@ CVE-2020-13796,0,0,bd47928a7bd716fd77e3d2677f9696f0d4248706a22a2b365669f5f5b8e2b
|
|||||||
CVE-2020-13797,0,0,76547dfa026dda2fdb29c6043944563af2e025be32c84cfb3e347e44079c0afa,2020-06-04T13:40:58.537000
|
CVE-2020-13797,0,0,76547dfa026dda2fdb29c6043944563af2e025be32c84cfb3e347e44079c0afa,2020-06-04T13:40:58.537000
|
||||||
CVE-2020-13798,0,0,0c4dcc9579111d9929724cf7f5b0c3ee1c3762f8860c9e8880d5808d5d86ce41,2020-06-04T13:23:48.547000
|
CVE-2020-13798,0,0,0c4dcc9579111d9929724cf7f5b0c3ee1c3762f8860c9e8880d5808d5d86ce41,2020-06-04T13:23:48.547000
|
||||||
CVE-2020-13799,0,0,291f8ce7c167b57ccb4dfd3eb685c89ab2ce2141c5b6b855c5b5471ff977a920,2021-06-29T14:29:27.113000
|
CVE-2020-13799,0,0,291f8ce7c167b57ccb4dfd3eb685c89ab2ce2141c5b6b855c5b5471ff977a920,2021-06-29T14:29:27.113000
|
||||||
CVE-2020-1380,0,0,c5651dd57fb4986580f2190a6e15698a139632aa04d9b4907ce293ea6c9a8c9f,2024-01-19T00:15:10.350000
|
CVE-2020-1380,0,1,00be26b94ee0fdbbf173f41abb5759b3661661c9e9fecac92d9aa1f553244828,2024-07-26T19:55:41.693000
|
||||||
CVE-2020-13800,0,0,ad48d8f4dfa66ebd1409ab1c2dcbe35bc8c74e913a6a11bbbcce515afe59dfa2,2022-04-28T19:30:48.957000
|
CVE-2020-13800,0,0,ad48d8f4dfa66ebd1409ab1c2dcbe35bc8c74e913a6a11bbbcce515afe59dfa2,2022-04-28T19:30:48.957000
|
||||||
CVE-2020-13802,0,0,ab425c7f2844f0e7eaac8f244ed54b2e29fb9128670793b29b81bba27844e7c5,2021-07-21T11:39:23.747000
|
CVE-2020-13802,0,0,ab425c7f2844f0e7eaac8f244ed54b2e29fb9128670793b29b81bba27844e7c5,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-13803,0,0,69bf6905469d6f4f6efb76df7add61880052e0223c57947f5d4976c664756abb,2020-06-05T16:46:09.883000
|
CVE-2020-13803,0,0,69bf6905469d6f4f6efb76df7add61880052e0223c57947f5d4976c664756abb,2020-06-05T16:46:09.883000
|
||||||
@ -149374,7 +149374,7 @@ CVE-2020-14636,0,0,2c537575deceb138cda3e3e510a9104837d6a916f97e5300845572e083fcf
|
|||||||
CVE-2020-14637,0,0,917f00d3b52c1b82cca9086962b1a08d9b9e90d248b9e6ae763cf7f537fe2cd2,2020-07-20T16:16:45.010000
|
CVE-2020-14637,0,0,917f00d3b52c1b82cca9086962b1a08d9b9e90d248b9e6ae763cf7f537fe2cd2,2020-07-20T16:16:45.010000
|
||||||
CVE-2020-14638,0,0,887ca936098c0d0a3fb4b16d4e58fe1dc86ab181d70b9979800864032d2ef66a,2020-07-20T16:19:20.687000
|
CVE-2020-14638,0,0,887ca936098c0d0a3fb4b16d4e58fe1dc86ab181d70b9979800864032d2ef66a,2020-07-20T16:19:20.687000
|
||||||
CVE-2020-14639,0,0,d0829f57a2579b65beed4fb8e10b7cac2f98c29317054625017bf57494e962cc,2021-07-21T11:39:23.747000
|
CVE-2020-14639,0,0,d0829f57a2579b65beed4fb8e10b7cac2f98c29317054625017bf57494e962cc,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-1464,0,0,6d58f7d84f97010df3739e231c31cdc96ee5b19d65b8855a0737469d941748f5,2024-01-19T00:15:10.790000
|
CVE-2020-1464,0,1,0af4d5daffe5ddff069415067be6d44fc1c6ea4bd57def5a6bc7bd191ca4fe3d,2024-07-26T19:55:33.947000
|
||||||
CVE-2020-14640,0,0,a625b80b7f5e18e7a35950b5794b7d7fb6ccf5d93316771918c7e61df0248d53,2020-07-20T15:28:34.993000
|
CVE-2020-14640,0,0,a625b80b7f5e18e7a35950b5794b7d7fb6ccf5d93316771918c7e61df0248d53,2020-07-20T15:28:34.993000
|
||||||
CVE-2020-14641,0,0,5434c3e9d3bca8f35e7c9dbb9f09a8afe53a071667fe4357f0eaf79b61b0e16f,2022-04-28T18:57:38.380000
|
CVE-2020-14641,0,0,5434c3e9d3bca8f35e7c9dbb9f09a8afe53a071667fe4357f0eaf79b61b0e16f,2022-04-28T18:57:38.380000
|
||||||
CVE-2020-14642,0,0,104b19d410be569d6ea4bbc8f636508c676065723fe09fd1fa0fcb2ef25b55e2,2020-07-20T15:33:40.177000
|
CVE-2020-14642,0,0,104b19d410be569d6ea4bbc8f636508c676065723fe09fd1fa0fcb2ef25b55e2,2020-07-20T15:33:40.177000
|
||||||
@ -151234,7 +151234,7 @@ CVE-2020-1684,0,0,889893747e19efe219aa7e93dbbb5d8cdc761e955fd0e4dec6a602b8bb65f4
|
|||||||
CVE-2020-16843,0,0,b1110206c377bbe41a1544ac4132e9fb4aa7922b4839b09787e8cb77c5bdb171,2020-08-19T18:39:27.377000
|
CVE-2020-16843,0,0,b1110206c377bbe41a1544ac4132e9fb4aa7922b4839b09787e8cb77c5bdb171,2020-08-19T18:39:27.377000
|
||||||
CVE-2020-16844,0,0,a3cf436f2d1b5530564b0078422e28bdd87d1e35682e010964deb601cef00880,2020-10-15T17:31:28.837000
|
CVE-2020-16844,0,0,a3cf436f2d1b5530564b0078422e28bdd87d1e35682e010964deb601cef00880,2020-10-15T17:31:28.837000
|
||||||
CVE-2020-16845,0,0,307a77cfa895b0930069bbf519fcc28e0ad2275bea128589efeaa1dca6a7a480,2023-11-07T03:19:07.360000
|
CVE-2020-16845,0,0,307a77cfa895b0930069bbf519fcc28e0ad2275bea128589efeaa1dca6a7a480,2023-11-07T03:19:07.360000
|
||||||
CVE-2020-16846,0,0,dbe4631306ce1a72aba03a0970001667d2f026544bda2e482a38f52f998bd246,2023-11-07T03:19:07.447000
|
CVE-2020-16846,0,1,55d09435550703ae5331e7146060b84fc6e9de94bbe40f5f266a242c91fc29b8,2024-07-26T19:53:20.137000
|
||||||
CVE-2020-16847,0,0,d033a913ef6dc348c7cde79bc7b23f6593360c561df5e8eaef7b2f78d13462f7,2020-08-11T14:01:21.080000
|
CVE-2020-16847,0,0,d033a913ef6dc348c7cde79bc7b23f6593360c561df5e8eaef7b2f78d13462f7,2020-08-11T14:01:21.080000
|
||||||
CVE-2020-16849,0,0,b7e0886de366ab7fae0bce87b2e0c6bf0dc723bce8edfa4e544d2e36431ec2cc,2020-12-04T17:38:01.333000
|
CVE-2020-16849,0,0,b7e0886de366ab7fae0bce87b2e0c6bf0dc723bce8edfa4e544d2e36431ec2cc,2020-12-04T17:38:01.333000
|
||||||
CVE-2020-1685,0,0,6f3cfab547910f5a2b40db35cc3ac25c3a8618659a6a914c5ea161de3625e530,2021-02-05T16:49:04.023000
|
CVE-2020-1685,0,0,6f3cfab547910f5a2b40db35cc3ac25c3a8618659a6a914c5ea161de3625e530,2021-02-05T16:49:04.023000
|
||||||
@ -151531,7 +151531,7 @@ CVE-2020-17140,0,0,a26054f31e1b5bddc0a64706ce05fff34997b9a90133047695370595464f7
|
|||||||
CVE-2020-17141,0,0,68b73a426225df9a743f1d9e32a41744644e0dcc020b3bbd1fdb59fbf1678ee4,2023-12-30T00:15:16.190000
|
CVE-2020-17141,0,0,68b73a426225df9a743f1d9e32a41744644e0dcc020b3bbd1fdb59fbf1678ee4,2023-12-30T00:15:16.190000
|
||||||
CVE-2020-17142,0,0,524d6362673064d13cf42257972a34297bb8c267ece439b29d435cac1c1f81ff,2023-12-30T00:15:16.427000
|
CVE-2020-17142,0,0,524d6362673064d13cf42257972a34297bb8c267ece439b29d435cac1c1f81ff,2023-12-30T00:15:16.427000
|
||||||
CVE-2020-17143,0,0,40689d89cdeddafb77c44810ae98026f665760df18b1999d86687596d49b2d9f,2023-12-30T00:15:16.620000
|
CVE-2020-17143,0,0,40689d89cdeddafb77c44810ae98026f665760df18b1999d86687596d49b2d9f,2023-12-30T00:15:16.620000
|
||||||
CVE-2020-17144,0,0,779bd8343d984fe8328e19a6d7e018b794a732c0d1bd5d967fa23097e9255a0a,2023-12-30T00:15:16.830000
|
CVE-2020-17144,0,1,30b31e085ae11f897556dadfb5e9b094a9072f855daee18358f3157f82c9958e,2024-07-26T19:53:06.077000
|
||||||
CVE-2020-17145,0,0,2d1de6b07c5912af37ece60f885aba50a6040fed2b1490ba25c945021ccfdf23,2023-12-31T18:15:50.353000
|
CVE-2020-17145,0,0,2d1de6b07c5912af37ece60f885aba50a6040fed2b1490ba25c945021ccfdf23,2023-12-31T18:15:50.353000
|
||||||
CVE-2020-17147,0,0,e18aee6ff6d6ab3a038ca391596b6297ca65ec5dd8128078fd8b079e347e13d2,2023-12-30T00:15:17.023000
|
CVE-2020-17147,0,0,e18aee6ff6d6ab3a038ca391596b6297ca65ec5dd8128078fd8b079e347e13d2,2023-12-30T00:15:17.023000
|
||||||
CVE-2020-17148,0,0,adfb38d9b8ade039647d4a84628363c037aae35ef5461576687aff1e5ae7a269,2023-12-30T00:15:17.227000
|
CVE-2020-17148,0,0,adfb38d9b8ade039647d4a84628363c037aae35ef5461576687aff1e5ae7a269,2023-12-30T00:15:17.227000
|
||||||
@ -154563,7 +154563,7 @@ CVE-2020-25209,0,0,aaedfd644422205bc03f7de1e72794889482c74989f95097cebc1019b6aa0
|
|||||||
CVE-2020-25210,0,0,d6d981e68a6fec8e703ec388d330bd56020757440ebe0f1dbdcd2113f98a4e53,2021-07-21T11:39:23.747000
|
CVE-2020-25210,0,0,d6d981e68a6fec8e703ec388d330bd56020757440ebe0f1dbdcd2113f98a4e53,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-25211,0,0,58453eae665079f62b4a29bf2d14789da6723650d0a4aba9e12d881dbf4e0f8c,2023-11-07T03:20:13.097000
|
CVE-2020-25211,0,0,58453eae665079f62b4a29bf2d14789da6723650d0a4aba9e12d881dbf4e0f8c,2023-11-07T03:20:13.097000
|
||||||
CVE-2020-25212,0,0,76b2ea151b59d3e75d0475c927e316ab5b237a0a4c698e34721546521bc3c297,2022-04-28T18:32:14.263000
|
CVE-2020-25212,0,0,76b2ea151b59d3e75d0475c927e316ab5b237a0a4c698e34721546521bc3c297,2022-04-28T18:32:14.263000
|
||||||
CVE-2020-25213,0,0,86760e44075f82940119d3d18f8153d05a7c3efae58791ae1e50688dd69ea584,2023-04-03T20:15:07.003000
|
CVE-2020-25213,0,1,7e128542aa67e1964c3c945901585f69b2a2628aa9ea2cf458f38e39993ea890,2024-07-26T19:54:54.537000
|
||||||
CVE-2020-25214,0,0,31296aeea49a7c7899d28951d2205f9881381d1350a42eb488d73bf765ecff4d,2020-10-28T17:51:50.997000
|
CVE-2020-25214,0,0,31296aeea49a7c7899d28951d2205f9881381d1350a42eb488d73bf765ecff4d,2020-10-28T17:51:50.997000
|
||||||
CVE-2020-25215,0,0,16fe62dcaf003353e5ed5b424a92167681aef317c379b6c27e7a6198c16eaf01,2023-09-28T14:15:10.477000
|
CVE-2020-25215,0,0,16fe62dcaf003353e5ed5b424a92167681aef317c379b6c27e7a6198c16eaf01,2023-09-28T14:15:10.477000
|
||||||
CVE-2020-25216,0,0,294e17a02a373b2d888f35cb86f216e65b40db4b475c902a718802486a90f94a,2023-09-28T14:15:10.933000
|
CVE-2020-25216,0,0,294e17a02a373b2d888f35cb86f216e65b40db4b475c902a718802486a90f94a,2023-09-28T14:15:10.933000
|
||||||
@ -157493,7 +157493,7 @@ CVE-2020-2958,0,0,c85503e229d575626c95772826bd8bd7a7d1aa876fdd5ce4f35000bdb735e0
|
|||||||
CVE-2020-29580,0,0,a930e2cb150f840ea654ce2a21f9ce2cb1b30b109eb98082abc691ccc29f3b0b,2020-12-22T04:31:33.220000
|
CVE-2020-29580,0,0,a930e2cb150f840ea654ce2a21f9ce2cb1b30b109eb98082abc691ccc29f3b0b,2020-12-22T04:31:33.220000
|
||||||
CVE-2020-29581,0,0,00f541fc72214cab359f16eecdb88c3db882112f1ad96389fdf844fef7534073,2020-12-22T04:30:31.653000
|
CVE-2020-29581,0,0,00f541fc72214cab359f16eecdb88c3db882112f1ad96389fdf844fef7534073,2020-12-22T04:30:31.653000
|
||||||
CVE-2020-29582,0,0,d1eedf97b0b266779fc0209dd6fd9aead874763e45a51e5a33d77c172116f218,2023-11-07T03:21:32.183000
|
CVE-2020-29582,0,0,d1eedf97b0b266779fc0209dd6fd9aead874763e45a51e5a33d77c172116f218,2023-11-07T03:21:32.183000
|
||||||
CVE-2020-29583,0,0,3c76bc33d9fe2fe92f2698d836ce4e75aa8510212b8c8a6afdf56e3c11d30816,2023-11-07T03:21:32.250000
|
CVE-2020-29583,0,1,39785792bb37a06bb135ccc1e06ac5aedcf391341b84904c5e857c83aa35a59b,2024-07-26T19:46:46.690000
|
||||||
CVE-2020-29587,0,0,9d707724f35195cb2f7d29a07a0c5d133931f76520851611fd13449183ec8dc5,2021-01-21T17:29:29.630000
|
CVE-2020-29587,0,0,9d707724f35195cb2f7d29a07a0c5d133931f76520851611fd13449183ec8dc5,2021-01-21T17:29:29.630000
|
||||||
CVE-2020-29589,0,0,895f687d164d1427cbedc96e2b85cb145015954cb0c01daa47fd5cc3c52b5039,2023-11-07T03:21:32.350000
|
CVE-2020-29589,0,0,895f687d164d1427cbedc96e2b85cb145015954cb0c01daa47fd5cc3c52b5039,2023-11-07T03:21:32.350000
|
||||||
CVE-2020-2959,0,0,2a575576063620ea56d668e49a86e9ceb64a78b086524b7df9c52a43a4ed198c,2021-02-22T14:01:23.240000
|
CVE-2020-2959,0,0,2a575576063620ea56d668e49a86e9ceb64a78b086524b7df9c52a43a4ed198c,2021-02-22T14:01:23.240000
|
||||||
@ -158351,7 +158351,7 @@ CVE-2020-35656,0,0,00c1cbbe1d55099454a6a54ec4bf97ba0eeb3da20e8cfcff9fa57797c04f5
|
|||||||
CVE-2020-35657,0,0,de48e6f89ddf422b198b65d3bf70ae77937d968eff72e207ea781395cda45c86,2020-12-23T18:45:37.860000
|
CVE-2020-35657,0,0,de48e6f89ddf422b198b65d3bf70ae77937d968eff72e207ea781395cda45c86,2020-12-23T18:45:37.860000
|
||||||
CVE-2020-35658,0,0,bac6cf1c7aef565f1a1698a02251a8469c92fa52deab1b2d5ef8b5c883769f5e,2021-07-21T11:39:23.747000
|
CVE-2020-35658,0,0,bac6cf1c7aef565f1a1698a02251a8469c92fa52deab1b2d5ef8b5c883769f5e,2021-07-21T11:39:23.747000
|
||||||
CVE-2020-35659,0,0,4441c1e1c8903144d64ad9be702d4ee0e77db6bbdf385bea53c34fd5963846e4,2020-12-28T17:40:47.570000
|
CVE-2020-35659,0,0,4441c1e1c8903144d64ad9be702d4ee0e77db6bbdf385bea53c34fd5963846e4,2020-12-28T17:40:47.570000
|
||||||
CVE-2020-3566,0,0,92fd0cd514a6f5d29c561da2d2bbdbf0312ce8d149fdbf14f1aa7b64b50f41fb,2023-11-07T03:22:55.183000
|
CVE-2020-3566,0,1,e1cfa7d5045a3d8ad006162cbffae3fab0acfa5538e71ade5e2b82f9f5feefb3,2024-07-26T19:55:20.327000
|
||||||
CVE-2020-35660,0,0,08a734959bf9e43b2dd6309403dbe1b952809996e47a441cf234ac58099c3bae,2021-04-19T19:19:32.800000
|
CVE-2020-35660,0,0,08a734959bf9e43b2dd6309403dbe1b952809996e47a441cf234ac58099c3bae,2021-04-19T19:19:32.800000
|
||||||
CVE-2020-35662,0,0,b174392db159d2e0107d1f38fc1a270afb82029d30dd345f455b297c74d48097,2023-12-21T18:22:07.907000
|
CVE-2020-35662,0,0,b174392db159d2e0107d1f38fc1a270afb82029d30dd345f455b297c74d48097,2023-12-21T18:22:07.907000
|
||||||
CVE-2020-35664,0,0,2cfbaaf1c74c1da117d4d6c1a5ecf1abc90b24b1bfdde941390c8b453f3729f8,2021-02-26T03:38:20.213000
|
CVE-2020-35664,0,0,2cfbaaf1c74c1da117d4d6c1a5ecf1abc90b24b1bfdde941390c8b453f3729f8,2021-02-26T03:38:20.213000
|
||||||
@ -174665,8 +174665,8 @@ CVE-2021-30629,0,0,cd771cc968831d1cbef74f1908fb26317a831feca7f91cddafd3107b9d5bf
|
|||||||
CVE-2021-3063,0,0,d2641df1165260fb7d134548d3110e1199aac69f88be7e88f2372e29bc84fc7a,2021-11-15T16:26:36.677000
|
CVE-2021-3063,0,0,d2641df1165260fb7d134548d3110e1199aac69f88be7e88f2372e29bc84fc7a,2021-11-15T16:26:36.677000
|
||||||
CVE-2021-30630,0,0,588d4ee120f50c491fc37ec493fb32892d68a87193e00f9e5632d550441ce6bf,2023-11-07T03:33:24.263000
|
CVE-2021-30630,0,0,588d4ee120f50c491fc37ec493fb32892d68a87193e00f9e5632d550441ce6bf,2023-11-07T03:33:24.263000
|
||||||
CVE-2021-30631,0,0,2b47c142c4ed4c9a070bdaeba54de5311273a95143ecedbd2f619cf72b99113e,2023-11-07T03:33:24.627000
|
CVE-2021-30631,0,0,2b47c142c4ed4c9a070bdaeba54de5311273a95143ecedbd2f619cf72b99113e,2023-11-07T03:33:24.627000
|
||||||
CVE-2021-30632,0,0,b35d63dd1d127c8941e44e0c133b96e3721dd1992f6d3522390d8feeafe22d78,2023-11-07T03:33:25.690000
|
CVE-2021-30632,0,1,5cc0bd7e21e01edca4c34a118a66b46b350791b8c867b8655fa16564be813889,2024-07-26T19:39:23.077000
|
||||||
CVE-2021-30633,0,0,aeffcc3aa1ed5d6ace71aa4d37e55202b1fb5eed433e4c7c95d28dd2e550c92e,2023-11-07T03:33:26.037000
|
CVE-2021-30633,0,1,8027838d13cc44478970209a67369ea9467d1fdc5522a074f8876feb915d1b73,2024-07-26T19:39:19.137000
|
||||||
CVE-2021-30635,0,0,2ae52babc565c34be8cbd681a64542971624160e07c1e58bf6b8aace7c6005fa,2021-05-04T00:17:13.977000
|
CVE-2021-30635,0,0,2ae52babc565c34be8cbd681a64542971624160e07c1e58bf6b8aace7c6005fa,2021-05-04T00:17:13.977000
|
||||||
CVE-2021-30636,0,0,0e5f40d8313880ab383453dc40389250fba9919822fc8ddab3d604000a3fe7ef,2022-01-28T03:02:04.510000
|
CVE-2021-30636,0,0,0e5f40d8313880ab383453dc40389250fba9919822fc8ddab3d604000a3fe7ef,2022-01-28T03:02:04.510000
|
||||||
CVE-2021-30637,0,0,ff35aa63a58e5dae56a65f49aee7c4ed3a750f2e8cbdc7fa2d9679a78f149152,2021-04-16T20:20:58.423000
|
CVE-2021-30637,0,0,ff35aa63a58e5dae56a65f49aee7c4ed3a750f2e8cbdc7fa2d9679a78f149152,2021-04-16T20:20:58.423000
|
||||||
@ -175240,7 +175240,7 @@ CVE-2021-31201,0,0,fbca124d3d9b2d3bc9d8ec4de7f88a1070f95a46e980086b2df9cdddfd8bb
|
|||||||
CVE-2021-31204,0,0,0695c6326fc617dd221a25070892a004fcdd4c67fecd1fa6019728f1b7c222f1,2023-12-29T00:15:49.127000
|
CVE-2021-31204,0,0,0695c6326fc617dd221a25070892a004fcdd4c67fecd1fa6019728f1b7c222f1,2023-12-29T00:15:49.127000
|
||||||
CVE-2021-31205,0,0,9a56150b8eef87e375bd721708124e7e4ec191982e79ccd996fa8ed7a92ef303,2023-11-06T23:15:10.030000
|
CVE-2021-31205,0,0,9a56150b8eef87e375bd721708124e7e4ec191982e79ccd996fa8ed7a92ef303,2023-11-06T23:15:10.030000
|
||||||
CVE-2021-31206,0,0,2b8d8155b375ffa6d1bc7a7c351f1481d58285503ae73120729610273d9e137c,2023-12-28T23:15:13.530000
|
CVE-2021-31206,0,0,2b8d8155b375ffa6d1bc7a7c351f1481d58285503ae73120729610273d9e137c,2023-12-28T23:15:13.530000
|
||||||
CVE-2021-31207,0,0,9e60d2ce5b5ae27f10f747324bcb213d1e7999ac987e7452d2261e9f6df60d31,2023-08-08T14:21:49.707000
|
CVE-2021-31207,0,1,a83138c237ab0f7c977e5cbfffb4b0ed8f69a0f040c1a4f3e225d8ff5b047a99,2024-07-26T19:25:27.687000
|
||||||
CVE-2021-31208,0,0,99c78670ab152b24b6296053bab8e03a94e18991a0c77fcd2d603ff315a02904,2023-08-02T00:15:14.850000
|
CVE-2021-31208,0,0,99c78670ab152b24b6296053bab8e03a94e18991a0c77fcd2d603ff315a02904,2023-08-02T00:15:14.850000
|
||||||
CVE-2021-31209,0,0,cfa812ba72c68bbae6f616ffe9cae6d09717f82d6421367464a7209b861077fe,2023-08-02T00:15:14.957000
|
CVE-2021-31209,0,0,cfa812ba72c68bbae6f616ffe9cae6d09717f82d6421367464a7209b861077fe,2023-08-02T00:15:14.957000
|
||||||
CVE-2021-3121,0,0,43692cbe232d4048f2d64fcc85b19ec147848e775e1da89589cd8a8598903e3e,2023-11-07T03:37:55.767000
|
CVE-2021-3121,0,0,43692cbe232d4048f2d64fcc85b19ec147848e775e1da89589cd8a8598903e3e,2023-11-07T03:37:55.767000
|
||||||
@ -175844,7 +175844,7 @@ CVE-2021-31975,0,0,cd6b3203e043c7f6558fde9033fae3139630d05661f4990e009ee172bf612
|
|||||||
CVE-2021-31976,0,0,6cf659d4b3d8e7043eda05e59180e2dac2a30c408a112c95a7787140fb6c8f2c,2023-08-01T23:15:15.420000
|
CVE-2021-31976,0,0,6cf659d4b3d8e7043eda05e59180e2dac2a30c408a112c95a7787140fb6c8f2c,2023-08-01T23:15:15.420000
|
||||||
CVE-2021-31977,0,0,ff8ef94766074d16e17524815f6f2f62bf9ec2560685d889ec68e68786210990,2023-08-01T23:15:15.557000
|
CVE-2021-31977,0,0,ff8ef94766074d16e17524815f6f2f62bf9ec2560685d889ec68e68786210990,2023-08-01T23:15:15.557000
|
||||||
CVE-2021-31978,0,0,2a5e2aee17f3a2c356362585bb20349ca95d25f4f95779d38d905286b892e649,2023-08-01T23:15:15.673000
|
CVE-2021-31978,0,0,2a5e2aee17f3a2c356362585bb20349ca95d25f4f95779d38d905286b892e649,2023-08-01T23:15:15.673000
|
||||||
CVE-2021-31979,0,0,3ef35d86ab93d0ba02c2115c1212fb961e9a84aa3b8e6b01fb3f70d891643c56,2023-12-28T23:15:14.937000
|
CVE-2021-31979,0,1,28afc856f0af28805577af721d81b2e94fb12ccea4cfdcda5cae70423e54400c,2024-07-26T19:25:37.813000
|
||||||
CVE-2021-3198,0,0,2ab759ca17adee81d51771e54a2c5f8718b359006d18d68134f419693da3e130,2021-08-02T19:08:57.870000
|
CVE-2021-3198,0,0,2ab759ca17adee81d51771e54a2c5f8718b359006d18d68134f419693da3e130,2021-08-02T19:08:57.870000
|
||||||
CVE-2021-31980,0,0,db7786521914b4024ae150762c55d3a60f318c201911cb7de7625e76f621455f,2023-12-28T23:15:15.170000
|
CVE-2021-31980,0,0,db7786521914b4024ae150762c55d3a60f318c201911cb7de7625e76f621455f,2023-12-28T23:15:15.170000
|
||||||
CVE-2021-31982,0,0,c87938401b69471c73040a44061c3e24f3da117a02ce717e43675c4228bbde2e,2023-08-01T21:15:09.777000
|
CVE-2021-31982,0,0,c87938401b69471c73040a44061c3e24f3da117a02ce717e43675c4228bbde2e,2023-08-01T21:15:09.777000
|
||||||
@ -177194,7 +177194,7 @@ CVE-2021-33766,0,0,7db0b7b0a848a2ea194c56711405b9178decaab7540de4e696bfda8d60f51
|
|||||||
CVE-2021-33767,0,0,c03d9fc75ec16d143efce50fd4b62dd3531abb75089d584376a677e40791dc4e,2023-12-28T23:15:20.773000
|
CVE-2021-33767,0,0,c03d9fc75ec16d143efce50fd4b62dd3531abb75089d584376a677e40791dc4e,2023-12-28T23:15:20.773000
|
||||||
CVE-2021-33768,0,0,98f731208fbc2908fb93a2b445409bf0aa40a714b5e45bbef0997966b800d545,2023-12-28T23:15:20.987000
|
CVE-2021-33768,0,0,98f731208fbc2908fb93a2b445409bf0aa40a714b5e45bbef0997966b800d545,2023-12-28T23:15:20.987000
|
||||||
CVE-2021-3377,0,0,aa11e07462ebabffc03391c9764df5060e142b7a45d02c628a32f178591ef1fe,2021-03-09T15:46:50.940000
|
CVE-2021-3377,0,0,aa11e07462ebabffc03391c9764df5060e142b7a45d02c628a32f178591ef1fe,2021-03-09T15:46:50.940000
|
||||||
CVE-2021-33771,0,0,b1c2e3738dc6b82bc60c1a4e1fefac80e37352348c30702ccf29f5626260a61e,2023-12-28T23:15:21.240000
|
CVE-2021-33771,0,1,8ee72dabbe68fb56fe83f80fc670cdf7f8e5cb03fd60e9dc5c316a3c0b152194,2024-07-26T19:25:47.657000
|
||||||
CVE-2021-33772,0,0,b11c79c03d840a0c513cb3a1587da3b191ae777dac970b6c5f2224265d7d89e6,2023-12-28T23:15:21.470000
|
CVE-2021-33772,0,0,b11c79c03d840a0c513cb3a1587da3b191ae777dac970b6c5f2224265d7d89e6,2023-12-28T23:15:21.470000
|
||||||
CVE-2021-33773,0,0,94942e70c080b8cb924e4ffc8ec7195d1882a6707dd1ac1dd64127a6586c7aef,2023-12-28T23:15:21.790000
|
CVE-2021-33773,0,0,94942e70c080b8cb924e4ffc8ec7195d1882a6707dd1ac1dd64127a6586c7aef,2023-12-28T23:15:21.790000
|
||||||
CVE-2021-33774,0,0,80c30f3521a0d63a193d9d2a37bf6de1233c8d6b25c3101cefbe11a3be6d8d32,2023-12-28T23:15:22.047000
|
CVE-2021-33774,0,0,80c30f3521a0d63a193d9d2a37bf6de1233c8d6b25c3101cefbe11a3be6d8d32,2023-12-28T23:15:22.047000
|
||||||
@ -177598,7 +177598,7 @@ CVE-2021-34444,0,0,aae35df9d316baffed2673fc782a79b93d2e0ea225012c95bdaa6c2801149
|
|||||||
CVE-2021-34445,0,0,55abc9c654691c0da70c49a70003f1961fe0dd156fdd161f68aec2027f923940,2023-12-28T23:15:26.890000
|
CVE-2021-34445,0,0,55abc9c654691c0da70c49a70003f1961fe0dd156fdd161f68aec2027f923940,2023-12-28T23:15:26.890000
|
||||||
CVE-2021-34446,0,0,c21c91e0664b3b9248b9aa9c18d0595bb139d692f6ae21d590eb1d2a9beabe5d,2023-12-28T23:15:27.123000
|
CVE-2021-34446,0,0,c21c91e0664b3b9248b9aa9c18d0595bb139d692f6ae21d590eb1d2a9beabe5d,2023-12-28T23:15:27.123000
|
||||||
CVE-2021-34447,0,0,7d289c286921cc0437f748fa49fa7aa3964f729611027c5fada1ab4f8d4393cf,2023-12-28T23:15:27.370000
|
CVE-2021-34447,0,0,7d289c286921cc0437f748fa49fa7aa3964f729611027c5fada1ab4f8d4393cf,2023-12-28T23:15:27.370000
|
||||||
CVE-2021-34448,0,0,a3d37ef8188bbb61ffa544c0a390e9c6227a7e166b57184cafbf7570bcd303af,2023-12-28T23:15:27.633000
|
CVE-2021-34448,0,1,5653f26813a84f3ceceb65db3c9f642b8368ff7f3e8cce9ec388ffa6b4dbe553,2024-07-26T19:26:11.723000
|
||||||
CVE-2021-34449,0,0,97fc4aa973beb45c4b292c6e06bb8cbf66b0b8c95cf38785f9ed4b6f566b6a21,2023-12-28T23:15:27.867000
|
CVE-2021-34449,0,0,97fc4aa973beb45c4b292c6e06bb8cbf66b0b8c95cf38785f9ed4b6f566b6a21,2023-12-28T23:15:27.867000
|
||||||
CVE-2021-3445,0,0,ca28e03b23df2d6930cfc7c8696f22adf1b0ce89765293ee89f9cecdb848c64c,2023-11-07T03:38:00.453000
|
CVE-2021-3445,0,0,ca28e03b23df2d6930cfc7c8696f22adf1b0ce89765293ee89f9cecdb848c64c,2023-11-07T03:38:00.453000
|
||||||
CVE-2021-34450,0,0,a1c63ebd9de410a1b8b779d74b1361117f3b0917a3d48a98fec860c550680489,2023-12-28T23:15:28.100000
|
CVE-2021-34450,0,0,a1c63ebd9de410a1b8b779d74b1361117f3b0917a3d48a98fec860c550680489,2023-12-28T23:15:28.100000
|
||||||
@ -177623,7 +177623,7 @@ CVE-2021-34469,0,0,71fed107629bfc5124d8e01a0e71db2e68c803450f7939c9b7ba26cc3eea8
|
|||||||
CVE-2021-3447,0,0,5d3fefcacb6ad012f59a687ceceba1919c15835ca824079125df18fa52dbecf6,2023-12-28T19:15:12.757000
|
CVE-2021-3447,0,0,5d3fefcacb6ad012f59a687ceceba1919c15835ca824079125df18fa52dbecf6,2023-12-28T19:15:12.757000
|
||||||
CVE-2021-34470,0,0,12bcd3bf722d273f007a2ab52a41dd6a1c4b4ae9a1a55885426293691c386c7e,2023-12-28T23:15:32.180000
|
CVE-2021-34470,0,0,12bcd3bf722d273f007a2ab52a41dd6a1c4b4ae9a1a55885426293691c386c7e,2023-12-28T23:15:32.180000
|
||||||
CVE-2021-34471,0,0,c5f1f263711bd311a2043625400536ac73d30533457c6e0d2c5dae3684b4c9bf,2023-12-28T20:15:47.707000
|
CVE-2021-34471,0,0,c5f1f263711bd311a2043625400536ac73d30533457c6e0d2c5dae3684b4c9bf,2023-12-28T20:15:47.707000
|
||||||
CVE-2021-34473,0,0,75b8e346502c3df57d6b0d97823df8dfabc46a7774fe1f7a029db1dcabe5260a,2023-12-28T23:15:32.450000
|
CVE-2021-34473,0,1,2cd99c1fa3b7f3ccb6d82398de13db1de24252076956da79ce52069a64ec1a1a,2024-07-26T19:26:02.790000
|
||||||
CVE-2021-34474,0,0,490203bc0d2d825f47f74f420693d2a041ad506a33c98383104b9d85cdb4755b,2023-12-28T23:15:32.683000
|
CVE-2021-34474,0,0,490203bc0d2d825f47f74f420693d2a041ad506a33c98383104b9d85cdb4755b,2023-12-28T23:15:32.683000
|
||||||
CVE-2021-34475,0,0,2e8fa9fc4a50b93568c0f6c6808be270a39b901d154f669eb3c6c2c2c711abe1,2023-08-02T17:30:31.880000
|
CVE-2021-34475,0,0,2e8fa9fc4a50b93568c0f6c6808be270a39b901d154f669eb3c6c2c2c711abe1,2023-08-02T17:30:31.880000
|
||||||
CVE-2021-34476,0,0,1f519d2fc0a896a44485079cadb6ba47391a382392eca4bab69edeafc75d6488,2023-12-28T23:15:32.900000
|
CVE-2021-34476,0,0,1f519d2fc0a896a44485079cadb6ba47391a382392eca4bab69edeafc75d6488,2023-12-28T23:15:32.900000
|
||||||
@ -179213,7 +179213,7 @@ CVE-2021-36738,0,0,6291e909a53f621ff7267febc879b94b4fbb555d0058e1f683c0dd8bcc641
|
|||||||
CVE-2021-36739,0,0,5947538ac7c104e041e87b610e0de26ebc1cf54019c58dfa4d6a71e07a3b84dc,2022-01-12T14:51:21.543000
|
CVE-2021-36739,0,0,5947538ac7c104e041e87b610e0de26ebc1cf54019c58dfa4d6a71e07a3b84dc,2022-01-12T14:51:21.543000
|
||||||
CVE-2021-3674,0,0,563264c78802544cb4b3fa2728b8c97860df26ed11c5cc67dd0b69dfdddf2b05,2023-03-29T12:51:09.367000
|
CVE-2021-3674,0,0,563264c78802544cb4b3fa2728b8c97860df26ed11c5cc67dd0b69dfdddf2b05,2023-03-29T12:51:09.367000
|
||||||
CVE-2021-36740,0,0,4fd38cdeca28c80f7bfaa9bbcd0436f17ea1f4b0872bc5b5b38a25ce52fd64e9,2023-11-07T03:36:47.880000
|
CVE-2021-36740,0,0,4fd38cdeca28c80f7bfaa9bbcd0436f17ea1f4b0872bc5b5b38a25ce52fd64e9,2023-11-07T03:36:47.880000
|
||||||
CVE-2021-36741,0,0,9f4175ee2b995de78650d71058690660bf8801f25e4303377a51e578d54d2b92,2023-11-07T03:36:47.957000
|
CVE-2021-36741,0,1,820d73ffeca1d30e11185d45f75ddf857e5d3f4994444a2825cfe2dd9926f9ed,2024-07-26T19:26:16.980000
|
||||||
CVE-2021-36742,0,0,07ea05af1858224c3817e40b7b9a2d523a8c564fef1172f75d681b0dac065ad2,2021-08-06T16:44:57.420000
|
CVE-2021-36742,0,0,07ea05af1858224c3817e40b7b9a2d523a8c564fef1172f75d681b0dac065ad2,2021-08-06T16:44:57.420000
|
||||||
CVE-2021-36744,0,0,b0e6317ab19586c4e417d13fd757169adda5c1c6b2aeef952179476525359f4a,2022-07-12T17:42:04.277000
|
CVE-2021-36744,0,0,b0e6317ab19586c4e417d13fd757169adda5c1c6b2aeef952179476525359f4a,2022-07-12T17:42:04.277000
|
||||||
CVE-2021-36745,0,0,7817c8fd2c7d80d2661bbb1bab99266ef44b2edd9ade725a335b8e256ef77116,2022-07-12T17:42:04.277000
|
CVE-2021-36745,0,0,7817c8fd2c7d80d2661bbb1bab99266ef44b2edd9ade725a335b8e256ef77116,2022-07-12T17:42:04.277000
|
||||||
@ -179395,12 +179395,12 @@ CVE-2021-36938,0,0,11b30a839c0862714961e1aef94bd2a89d2bc5b0e4f6a0c518d0a3c547ff8
|
|||||||
CVE-2021-3694,0,0,a9aa2f38213c30e8f905d9dfe58315eada3893a291beac4ebe84faabab0157a3,2021-08-27T15:02:29.647000
|
CVE-2021-3694,0,0,a9aa2f38213c30e8f905d9dfe58315eada3893a291beac4ebe84faabab0157a3,2021-08-27T15:02:29.647000
|
||||||
CVE-2021-36940,0,0,7c61c2b30b0b6277773bf559cb7b85ce205ebb8466740c0f490b613b0ef09ba6,2023-12-28T20:15:52.593000
|
CVE-2021-36940,0,0,7c61c2b30b0b6277773bf559cb7b85ce205ebb8466740c0f490b613b0ef09ba6,2023-12-28T20:15:52.593000
|
||||||
CVE-2021-36941,0,0,45b82d1d380d4c8cadaf044799ee2c91b7fb312d17776dcc0c66e21b3520e046,2023-12-28T20:15:52.780000
|
CVE-2021-36941,0,0,45b82d1d380d4c8cadaf044799ee2c91b7fb312d17776dcc0c66e21b3520e046,2023-12-28T20:15:52.780000
|
||||||
CVE-2021-36942,0,0,6d8eded1918f34389d159e7160e1ec7c3a119930b6737fb382092ddca41adb3b,2023-12-28T20:15:52.970000
|
CVE-2021-36942,0,1,a68c99b76b48df8fec68f8b884627b309410e35d4bc20678b1c019a06c39afe4,2024-07-26T19:29:48.297000
|
||||||
CVE-2021-36943,0,0,2e61b76bebf5eb44cb27c6ca058cfded9215a0b8f7c93221816ca261e12b0b45,2023-12-28T20:15:53.187000
|
CVE-2021-36943,0,0,2e61b76bebf5eb44cb27c6ca058cfded9215a0b8f7c93221816ca261e12b0b45,2023-12-28T20:15:53.187000
|
||||||
CVE-2021-36945,0,0,29c1bd4a250b82b2d53d188a1da6425d94c0e383a9498b1f7557ba84aa574f61,2023-12-28T20:15:53.390000
|
CVE-2021-36945,0,0,29c1bd4a250b82b2d53d188a1da6425d94c0e383a9498b1f7557ba84aa574f61,2023-12-28T20:15:53.390000
|
||||||
CVE-2021-36946,0,0,55c29cb6f7a0ff9f940d59c4dfa0103d303648e991ec7a4c9b08e55ce282804f,2023-12-28T20:15:53.573000
|
CVE-2021-36946,0,0,55c29cb6f7a0ff9f940d59c4dfa0103d303648e991ec7a4c9b08e55ce282804f,2023-12-28T20:15:53.573000
|
||||||
CVE-2021-36947,0,0,f317de0ae20a67390ddcae053ad37a4dbdeb72291cf7ed63a910ca4aa580d9d8,2023-12-28T20:15:53.777000
|
CVE-2021-36947,0,0,f317de0ae20a67390ddcae053ad37a4dbdeb72291cf7ed63a910ca4aa580d9d8,2023-12-28T20:15:53.777000
|
||||||
CVE-2021-36948,0,0,56645db4a14b5df715f2dae41b9ab5539ab4eaa60a214f9d0ba09f9a86144d2a,2023-12-28T20:15:54.010000
|
CVE-2021-36948,0,1,81c40f07d3c257f8d923c8da1edfd60e1cdacfe13847cf3ab6bc2a8ea84f31ec,2024-07-26T19:30:11.347000
|
||||||
CVE-2021-36949,0,0,14e681e0fcc389eb6ad117281453a48cf4197b2b39d2a2f922d7adb68dd162ed,2023-12-28T20:15:54.210000
|
CVE-2021-36949,0,0,14e681e0fcc389eb6ad117281453a48cf4197b2b39d2a2f922d7adb68dd162ed,2023-12-28T20:15:54.210000
|
||||||
CVE-2021-3695,0,0,b4df6c858626359a1af4c3f849818d4b1f9e6980b27aca3e64f307813ead5881,2023-09-13T16:15:09.430000
|
CVE-2021-3695,0,0,b4df6c858626359a1af4c3f849818d4b1f9e6980b27aca3e64f307813ead5881,2023-09-13T16:15:09.430000
|
||||||
CVE-2021-36950,0,0,2b83463b225ef3294ea65f926efa1735415ddd72b9a7652e20027a596ed154dc,2023-12-28T20:15:54.393000
|
CVE-2021-36950,0,0,2b83463b225ef3294ea65f926efa1735415ddd72b9a7652e20027a596ed154dc,2023-12-28T20:15:54.393000
|
||||||
@ -180199,10 +180199,10 @@ CVE-2021-3797,0,0,13f9920c68ee482f67daa3a18113bf0d3d87881feb2576bb7da19cb3041e48
|
|||||||
CVE-2021-37970,0,0,314cf7a1b637a17ccc85800ff70b2d063733fdd95d714f7fd1f003a3453f5d29,2023-11-07T03:37:05.910000
|
CVE-2021-37970,0,0,314cf7a1b637a17ccc85800ff70b2d063733fdd95d714f7fd1f003a3453f5d29,2023-11-07T03:37:05.910000
|
||||||
CVE-2021-37971,0,0,2ea5c3816e3cf290f9e2b8c3e38c74b750d2e7a2c7287a483898111692e1517a,2023-11-07T03:37:06.130000
|
CVE-2021-37971,0,0,2ea5c3816e3cf290f9e2b8c3e38c74b750d2e7a2c7287a483898111692e1517a,2023-11-07T03:37:06.130000
|
||||||
CVE-2021-37972,0,0,d1811ee1a1ec4ef2cf1753707b21d09e9708c258c127b30111028161f383a9eb,2023-11-07T03:37:06.190000
|
CVE-2021-37972,0,0,d1811ee1a1ec4ef2cf1753707b21d09e9708c258c127b30111028161f383a9eb,2023-11-07T03:37:06.190000
|
||||||
CVE-2021-37973,0,0,eef025123c73e5ac197719728c385e120a9dfd44e6224e5bee2151bad560fbf3,2024-02-15T02:00:01.650000
|
CVE-2021-37973,0,1,477c166c41f1d0c93b5469969feaf8e541b594c986d381632b5f32fa59c737cf,2024-07-26T19:39:05.947000
|
||||||
CVE-2021-37974,0,0,e4f714710168071d35079c4c4dcf487bdbffcd44da51f95422ae137bd3f219bd,2023-11-07T03:37:06.380000
|
CVE-2021-37974,0,0,e4f714710168071d35079c4c4dcf487bdbffcd44da51f95422ae137bd3f219bd,2023-11-07T03:37:06.380000
|
||||||
CVE-2021-37975,0,0,99e8b6a843aaacd457051b82d5e22543aaff43408fc79b5bda6222da1fae61c2,2023-11-07T03:37:06.463000
|
CVE-2021-37975,0,1,2f26080e0016a0ff6a9096eeeefdd85041d569dae7dddb53c318eb43938407cd,2024-07-26T19:38:59.427000
|
||||||
CVE-2021-37976,0,0,6bf158565669aa8fd5647d4394102e777d1cc40159d6cd80b1f9f681a169e6ab,2023-11-07T03:37:06.683000
|
CVE-2021-37976,0,1,d24926fc283a9d9e8727eb80e5c5ae2c6513248d3fa129cc48e42f0aa9ab521e,2024-07-26T19:38:29.753000
|
||||||
CVE-2021-37977,0,0,d0bc35a5eee087a23aa03071dd810f0555df729e36cf26ad905653a5ab3b2fe7,2023-11-07T03:37:06.823000
|
CVE-2021-37977,0,0,d0bc35a5eee087a23aa03071dd810f0555df729e36cf26ad905653a5ab3b2fe7,2023-11-07T03:37:06.823000
|
||||||
CVE-2021-37978,0,0,da0f061782f6681ceb98e0937e5c745687feb999ba9a500b0bafb08634e5b963,2023-11-07T03:37:06.903000
|
CVE-2021-37978,0,0,da0f061782f6681ceb98e0937e5c745687feb999ba9a500b0bafb08634e5b963,2023-11-07T03:37:06.903000
|
||||||
CVE-2021-37979,0,0,aa646a0333359e250d4aedface59ad25647f7b1fd34a44f6d57f16cda3ea2805,2023-11-07T03:37:07.043000
|
CVE-2021-37979,0,0,aa646a0333359e250d4aedface59ad25647f7b1fd34a44f6d57f16cda3ea2805,2023-11-07T03:37:07.043000
|
||||||
@ -183245,7 +183245,7 @@ CVE-2021-4177,0,0,347279267130fa2d4fd9682059df53d16a86645b54aaf8dee51efafd976490
|
|||||||
CVE-2021-41770,0,0,e663efb2be268ffb695e25f10decdb652a441eaf74e1748d92aaaee92f9bac13,2023-11-07T03:39:00.150000
|
CVE-2021-41770,0,0,e663efb2be268ffb695e25f10decdb652a441eaf74e1748d92aaaee92f9bac13,2023-11-07T03:39:00.150000
|
||||||
CVE-2021-41771,0,0,7f41dbaf9d2799d1087be50cc2595ec88032333f8909d8757e6c00865273eac9,2023-11-07T03:39:00.400000
|
CVE-2021-41771,0,0,7f41dbaf9d2799d1087be50cc2595ec88032333f8909d8757e6c00865273eac9,2023-11-07T03:39:00.400000
|
||||||
CVE-2021-41772,0,0,ce7a9acf97f84055669b0e4b64652765051d82e98d6f2e6979463070634c3fb3,2023-11-07T03:39:00.470000
|
CVE-2021-41772,0,0,ce7a9acf97f84055669b0e4b64652765051d82e98d6f2e6979463070634c3fb3,2023-11-07T03:39:00.470000
|
||||||
CVE-2021-41773,0,0,a5a57b2e160e0b3324c58b2e734d22a40d060bbfd940e043ba66f26e56dba35b,2023-11-07T03:39:00.550000
|
CVE-2021-41773,0,1,4cfdfa74a3379ebf77a8fc98ffba0d98f195f6a1a72791a5f2c2b29ac0346218,2024-07-26T19:40:13.757000
|
||||||
CVE-2021-4178,0,0,c56c7ecf53fdc8574173d0afd93f83182144b6737dcdf3ae22069874b25b5b16,2022-10-04T17:55:01.783000
|
CVE-2021-4178,0,0,c56c7ecf53fdc8574173d0afd93f83182144b6737dcdf3ae22069874b25b5b16,2022-10-04T17:55:01.783000
|
||||||
CVE-2021-41780,0,0,258a9638b33a433252dee0fdedd3d524593db2f532009665bf1792fbc6fe5099,2024-07-03T01:37:01.927000
|
CVE-2021-41780,0,0,258a9638b33a433252dee0fdedd3d524593db2f532009665bf1792fbc6fe5099,2024-07-03T01:37:01.927000
|
||||||
CVE-2021-41781,0,0,256f9bcedd5b46b77332cd7d2616bd58c1de8a84f97a565792c92b03036d9922,2022-09-02T13:17:21.697000
|
CVE-2021-41781,0,0,256f9bcedd5b46b77332cd7d2616bd58c1de8a84f97a565792c92b03036d9922,2022-09-02T13:17:21.697000
|
||||||
@ -183410,7 +183410,7 @@ CVE-2021-4201,0,0,0d7f4c2af470456a2b1204e158162c4c74adc228cc2ac757245790cba0acc0
|
|||||||
CVE-2021-42010,0,0,2de9e058ab258bfe303f83343bbcd6500f87ee2d03174c5e789d9021a0bf1893,2023-08-08T14:22:24.967000
|
CVE-2021-42010,0,0,2de9e058ab258bfe303f83343bbcd6500f87ee2d03174c5e789d9021a0bf1893,2023-08-08T14:22:24.967000
|
||||||
CVE-2021-42011,0,0,6fca5fa9751b4b100c0b42e40a6c77d594d627fe063f1739884db8b0ef5d162c,2021-10-27T11:47:30.023000
|
CVE-2021-42011,0,0,6fca5fa9751b4b100c0b42e40a6c77d594d627fe063f1739884db8b0ef5d162c,2021-10-27T11:47:30.023000
|
||||||
CVE-2021-42012,0,0,8e06570b6ccc701b67341b60ae1f8de7933ac8c7a557a3072e626c6b5209671e,2021-10-27T12:45:00.777000
|
CVE-2021-42012,0,0,8e06570b6ccc701b67341b60ae1f8de7933ac8c7a557a3072e626c6b5209671e,2021-10-27T12:45:00.777000
|
||||||
CVE-2021-42013,0,0,edd68fd329f9461423fd0f1f59010ddecab52065452031a76485312e5783b415,2023-11-07T03:39:05.670000
|
CVE-2021-42013,0,1,4a4430bf73fa49a877916845835f16ceda367f3772027f0520e1dfb1075d8e9a,2024-07-26T19:39:26.967000
|
||||||
CVE-2021-42015,0,0,55df6420ceeb22b78c4af14632d2076aad8cc69ffbdc55646f47ecfaf124ff8e,2021-11-12T20:25:10.053000
|
CVE-2021-42015,0,0,55df6420ceeb22b78c4af14632d2076aad8cc69ffbdc55646f47ecfaf124ff8e,2021-11-12T20:25:10.053000
|
||||||
CVE-2021-42016,0,0,d95e1184a7419bd566e8de7c7219921579b3d66a8098dc1b7cd2188d2364792b,2023-12-12T12:15:08.800000
|
CVE-2021-42016,0,0,d95e1184a7419bd566e8de7c7219921579b3d66a8098dc1b7cd2188d2364792b,2023-12-12T12:15:08.800000
|
||||||
CVE-2021-42017,0,0,5268e887ec0567990ce80442cf2f9d2f9c56972fbf81a0f1517f445ff5662105,2023-12-12T12:15:08.940000
|
CVE-2021-42017,0,0,5268e887ec0567990ce80442cf2f9d2f9c56972fbf81a0f1517f445ff5662105,2023-12-12T12:15:08.940000
|
||||||
@ -209748,15 +209748,15 @@ CVE-2022-45164,0,0,432eaac455b12dd7419a1007a38d27c0a77d78148eed3a1afd4c2b23eb10f
|
|||||||
CVE-2022-45165,0,0,9efab6cf6411a0fc8caccbaaf1daf9ba874b4c2f8614e971fe09e96ed6e68e05,2023-01-18T14:25:26.063000
|
CVE-2022-45165,0,0,9efab6cf6411a0fc8caccbaaf1daf9ba874b4c2f8614e971fe09e96ed6e68e05,2023-01-18T14:25:26.063000
|
||||||
CVE-2022-45166,0,0,57d394d2995f4377ba00ee929a99ae8999dd7ebccf487ee6e456c41109e40f7f,2023-01-14T04:30:32.190000
|
CVE-2022-45166,0,0,57d394d2995f4377ba00ee929a99ae8999dd7ebccf487ee6e456c41109e40f7f,2023-01-14T04:30:32.190000
|
||||||
CVE-2022-45167,0,0,c5b32132424a3624b1421ce4c4354da0169e930a29c58060268e6f5667e56aa7,2023-01-14T04:30:09.657000
|
CVE-2022-45167,0,0,c5b32132424a3624b1421ce4c4354da0169e930a29c58060268e6f5667e56aa7,2023-01-14T04:30:09.657000
|
||||||
CVE-2022-45168,0,0,ddd4ba279c99ce6845d251d15ca45b4970e7a61e17e5a03b8e54e660bec4dea2,2024-06-10T18:06:22.600000
|
CVE-2022-45168,0,1,5b01b558bd8fb24fbdf559be2087ec0c16d0cf3cbb1f9a0ca1cdeb2cef67be5a,2024-07-26T19:03:18.167000
|
||||||
CVE-2022-45169,0,0,7222c2b56d0b331567ef664210e0b16b62d545028152980c63562b6fe256a2e4,2024-04-01T15:52:55.667000
|
CVE-2022-45169,0,0,7222c2b56d0b331567ef664210e0b16b62d545028152980c63562b6fe256a2e4,2024-04-01T15:52:55.667000
|
||||||
CVE-2022-45170,0,0,51857a95e163773d3e1200b17d50a3b3d8525cbba5e34abc9e50a76427a0d58c,2023-04-19T19:28:52.097000
|
CVE-2022-45170,0,0,51857a95e163773d3e1200b17d50a3b3d8525cbba5e34abc9e50a76427a0d58c,2023-04-19T19:28:52.097000
|
||||||
CVE-2022-45171,0,0,ef37e9af4d3caeae5abdd4d9f4a610737c05facbe717172b0507d9acaa0071f7,2024-05-29T13:02:09.280000
|
CVE-2022-45171,0,1,87b3c5741d1429369fe869a8a7e0dca21115d2d8874e4ea1db3cf50366c5e401,2024-07-26T18:20:11.907000
|
||||||
CVE-2022-45172,0,0,745b90eadc3009c0d643fdb6b4b3cde168f7b2e5c5311df0a93dd1a20611c5d0,2023-02-08T19:36:45.417000
|
CVE-2022-45172,0,0,745b90eadc3009c0d643fdb6b4b3cde168f7b2e5c5311df0a93dd1a20611c5d0,2023-02-08T19:36:45.417000
|
||||||
CVE-2022-45173,0,0,a0092ffbece6db6e7205f68fa09683fc24fb2e34aec35aad09ff1ac7d2e3fefc,2023-04-19T19:28:48.537000
|
CVE-2022-45173,0,0,a0092ffbece6db6e7205f68fa09683fc24fb2e34aec35aad09ff1ac7d2e3fefc,2023-04-19T19:28:48.537000
|
||||||
CVE-2022-45174,0,0,3f7f7c5d7013a0067e2877ee4cb2092c2fcf048a7620c657269eba5bebe8be8e,2023-04-19T19:28:44.523000
|
CVE-2022-45174,0,0,3f7f7c5d7013a0067e2877ee4cb2092c2fcf048a7620c657269eba5bebe8be8e,2023-04-19T19:28:44.523000
|
||||||
CVE-2022-45175,0,0,a8cc8217e482a0dccfac6132846f8721ba6a8f4c0baabb45c6b6c109ca2be251,2023-04-19T19:28:40.410000
|
CVE-2022-45175,0,0,a8cc8217e482a0dccfac6132846f8721ba6a8f4c0baabb45c6b6c109ca2be251,2023-04-19T19:28:40.410000
|
||||||
CVE-2022-45176,0,0,c67460257b8c7bac53dd2fa6b0736193009cc569fecabd55d73e5bb9bdf0420c,2024-06-10T18:06:22.600000
|
CVE-2022-45176,0,1,0faa4c1edee8be6d16bc5d4c662dff5a28936b2848401e91c1072b2ac7d84abd,2024-07-26T18:03:21.673000
|
||||||
CVE-2022-45177,0,0,fd47742793a3f954e66d5f7399e048a8ee12c1c893caa070e50ce1f3acb694ea,2024-04-01T15:52:59.233000
|
CVE-2022-45177,0,0,fd47742793a3f954e66d5f7399e048a8ee12c1c893caa070e50ce1f3acb694ea,2024-04-01T15:52:59.233000
|
||||||
CVE-2022-45178,0,0,500d3d9606f76c026a3fafe70bf4bc346782a36d799854c05b51a3db2132012c,2023-04-19T19:28:36.003000
|
CVE-2022-45178,0,0,500d3d9606f76c026a3fafe70bf4bc346782a36d799854c05b51a3db2132012c,2023-04-19T19:28:36.003000
|
||||||
CVE-2022-45179,0,0,2458c5ec0e8b99f77bb5248d1e9ed7d32387388aa116c02ff97bbf760f3f84d9,2024-04-01T15:52:47.307000
|
CVE-2022-45179,0,0,2458c5ec0e8b99f77bb5248d1e9ed7d32387388aa116c02ff97bbf760f3f84d9,2024-04-01T15:52:47.307000
|
||||||
@ -237371,7 +237371,7 @@ CVE-2023-50692,0,0,6348689bc92a3d7d2b93f4ab7cffabad0f40b97f51e9c86bf7ce40c57b840
|
|||||||
CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a664,2024-03-05T21:15:07.367000
|
CVE-2023-50693,0,0,dd08939e4ce32c03f59f04532580821ca5b697adc34a251e1c45db564373a664,2024-03-05T21:15:07.367000
|
||||||
CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000
|
CVE-2023-50694,0,0,78b1aa0914931a0876815df8adb1c998b4fa38e7b62d7363c774f0a97cabce80,2024-03-21T02:49:58.640000
|
||||||
CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000
|
CVE-2023-5070,0,0,9fb6a723c8279931601cd42b57dae05abcb788776665c70d867d5b3fe8e04ffe,2023-11-07T04:23:25.600000
|
||||||
CVE-2023-50700,1,1,d1a5fa63c1100d62a5873085c943b942ea0f0a96aa3b1619608f7531039c0ad7,2024-07-26T17:15:10.803000
|
CVE-2023-50700,0,0,d1a5fa63c1100d62a5873085c943b942ea0f0a96aa3b1619608f7531039c0ad7,2024-07-26T17:15:10.803000
|
||||||
CVE-2023-50702,0,0,aabbc77a2d305beae7af1d1ea3729a356ffb437e099440502361eda2d189553a,2024-03-27T12:29:30.307000
|
CVE-2023-50702,0,0,aabbc77a2d305beae7af1d1ea3729a356ffb437e099440502361eda2d189553a,2024-03-27T12:29:30.307000
|
||||||
CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000
|
CVE-2023-50703,0,0,5412fe627eb96f0f79abae297ed08738bff2931ef5956788ab3e3239f68219e5,2023-12-29T16:32:32.477000
|
||||||
CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000
|
CVE-2023-50704,0,0,d49cda3dff4ba1c0ede49172a75175738fe4d5075a250a9b7bfefb732a3e26ef,2023-12-29T16:31:20.133000
|
||||||
@ -240823,7 +240823,7 @@ CVE-2023-7244,0,0,167bffb73965b6b1d51346cdd70948d0b03120fd099b92c4ff80445f861f1f
|
|||||||
CVE-2023-7245,0,0,a421df92ce644454fe097795d1da0ec80380ee5cbb65aae1a0ad296b590de092,2024-02-20T19:50:53.960000
|
CVE-2023-7245,0,0,a421df92ce644454fe097795d1da0ec80380ee5cbb65aae1a0ad296b590de092,2024-02-20T19:50:53.960000
|
||||||
CVE-2023-7246,0,0,0b0747a3436244f62d2aad9027219d9cff24b1b7c0f13d7408447e0c04c18989,2024-03-20T13:00:16.367000
|
CVE-2023-7246,0,0,0b0747a3436244f62d2aad9027219d9cff24b1b7c0f13d7408447e0c04c18989,2024-03-20T13:00:16.367000
|
||||||
CVE-2023-7247,0,0,3c451c661c0927b53e39951e13124c8c8a971760a04aa2ebc49094f73aca31eb,2024-03-12T12:40:13.500000
|
CVE-2023-7247,0,0,3c451c661c0927b53e39951e13124c8c8a971760a04aa2ebc49094f73aca31eb,2024-03-12T12:40:13.500000
|
||||||
CVE-2023-7248,0,0,0239fa085eef4d54d30a064eda3398f989db5d488df615db629ee658b179c363,2024-03-17T22:38:29.433000
|
CVE-2023-7248,0,1,89fb0153d5d95a0d63adb7f25676b5b6c97388e661ba5f8924ac36ffce0f3f87,2024-07-26T19:11:49.893000
|
||||||
CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000
|
CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000
|
||||||
CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000
|
CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000
|
||||||
CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000
|
CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000
|
||||||
@ -240835,7 +240835,7 @@ CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba15
|
|||||||
CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
|
CVE-2023-7268,0,0,c61b2680229d9fa33f1c954c8726fa832de0e98c894a6bedd271579a687f7cbb,2024-07-19T13:01:44.567000
|
||||||
CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
|
CVE-2023-7269,0,0,3f1411775e418b1331660b2e2f08e21ffd79ce221427bae98ae26bf35cbe5cb7,2024-07-19T13:01:44.567000
|
||||||
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
|
CVE-2023-7270,0,0,3d7ad3a206c04c3798343468b0d534eca04f86eefe46ec321113ac7e2ecdcd6a,2024-07-04T07:15:10.497000
|
||||||
CVE-2023-7271,0,0,3e307303c92928740949f0130fc49de091c30f6742adc012d6c4aaa808a584a9,2024-07-25T12:36:39.947000
|
CVE-2023-7271,0,1,d3dfbc895014f6fee39494b1979fe9a27f5d54abe140606ba373f42540f5c875,2024-07-26T18:19:28
|
||||||
CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000
|
CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d6c,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000
|
CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000
|
||||||
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
|
CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000
|
||||||
@ -245391,7 +245391,7 @@ CVE-2024-2425,0,0,5244503cb81f1535e5c26158f97c8ff5a0be1d108c008e859e8897a136ecd7
|
|||||||
CVE-2024-24254,0,0,aa3e1e0113c1afb51d7c9ea40615c9f0ca117924787150a26ed63a73b49e27db,2024-02-15T18:46:57.737000
|
CVE-2024-24254,0,0,aa3e1e0113c1afb51d7c9ea40615c9f0ca117924787150a26ed63a73b49e27db,2024-02-15T18:46:57.737000
|
||||||
CVE-2024-24255,0,0,e76da96580c60a9eda41d1841209285ca4cff39dd4bb1ea645c35657b9851939,2024-02-15T18:46:41.247000
|
CVE-2024-24255,0,0,e76da96580c60a9eda41d1841209285ca4cff39dd4bb1ea645c35657b9851939,2024-02-15T18:46:41.247000
|
||||||
CVE-2024-24256,0,0,fcdfa612c3f1867287942ad18dfc81885197768fb299b50a1e03fe4abbe75856,2024-02-15T14:28:31.380000
|
CVE-2024-24256,0,0,fcdfa612c3f1867287942ad18dfc81885197768fb299b50a1e03fe4abbe75856,2024-02-15T14:28:31.380000
|
||||||
CVE-2024-24257,1,1,18ed26a747ee2ccb808801e335187d1f8376b6bb759fc1155321396a6fec96fe,2024-07-26T17:15:11.173000
|
CVE-2024-24257,0,0,18ed26a747ee2ccb808801e335187d1f8376b6bb759fc1155321396a6fec96fe,2024-07-26T17:15:11.173000
|
||||||
CVE-2024-24258,0,0,b6889ab8117d84f2b926a30d9ca7e037f41ed41c51b57e24ece8c5f1f0d35cca,2024-02-21T03:15:09.043000
|
CVE-2024-24258,0,0,b6889ab8117d84f2b926a30d9ca7e037f41ed41c51b57e24ece8c5f1f0d35cca,2024-02-21T03:15:09.043000
|
||||||
CVE-2024-24259,0,0,27500963c89a35e88885dfebaf6906d578facbf79a9197c97e367a82d6750a09,2024-02-21T03:15:09.110000
|
CVE-2024-24259,0,0,27500963c89a35e88885dfebaf6906d578facbf79a9197c97e367a82d6750a09,2024-02-21T03:15:09.110000
|
||||||
CVE-2024-2426,0,0,6e67bd7547823c0951b38b7ed025ecb6861ed3d2534fad1723b99007466f0b1c,2024-03-26T12:55:05.010000
|
CVE-2024-2426,0,0,6e67bd7547823c0951b38b7ed025ecb6861ed3d2534fad1723b99007466f0b1c,2024-03-26T12:55:05.010000
|
||||||
@ -246855,7 +246855,7 @@ CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba007956
|
|||||||
CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000
|
CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000
|
||||||
CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000
|
CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
|
CVE-2024-26517,0,0,26d33e1785f323f6a59cabe443b6ac20ef93d37ea417fa08778ea549f200621f,2024-05-14T16:13:02.773000
|
||||||
CVE-2024-26520,1,1,2e8b8f31c930961addb2eb2d4dbd407df65c0a21c2f9be7dab545ed71cac96b6,2024-07-26T17:15:11.507000
|
CVE-2024-26520,0,0,2e8b8f31c930961addb2eb2d4dbd407df65c0a21c2f9be7dab545ed71cac96b6,2024-07-26T17:15:11.507000
|
||||||
CVE-2024-26521,0,0,7985e5a46b5dbb7cac5d9bc8fb1bd033c53432230144c1b88c935a11b26cd32a,2024-03-12T12:40:13.500000
|
CVE-2024-26521,0,0,7985e5a46b5dbb7cac5d9bc8fb1bd033c53432230144c1b88c935a11b26cd32a,2024-03-12T12:40:13.500000
|
||||||
CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000
|
CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c1ab,2024-03-13T12:33:51.697000
|
||||||
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
||||||
@ -247673,8 +247673,8 @@ CVE-2024-27353,0,0,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900af
|
|||||||
CVE-2024-27354,0,0,6669ef56de2629d6bd7a6c54cb75c8f6e454c14fc2065829ff46305d945b1196,2024-03-21T02:52:19.927000
|
CVE-2024-27354,0,0,6669ef56de2629d6bd7a6c54cb75c8f6e454c14fc2065829ff46305d945b1196,2024-03-21T02:52:19.927000
|
||||||
CVE-2024-27355,0,0,cbfd71f3fb28d8933e5fd0b89a2619127b39a508cc85ac5bc00d2b3fcc2d06dd,2024-03-21T02:52:19.970000
|
CVE-2024-27355,0,0,cbfd71f3fb28d8933e5fd0b89a2619127b39a508cc85ac5bc00d2b3fcc2d06dd,2024-03-21T02:52:19.970000
|
||||||
CVE-2024-27356,0,0,749ec2d4b1e51d4aafe83652bc0802a299a54d3561d4847f2c289cb0919b6c2e,2024-02-27T14:20:06.637000
|
CVE-2024-27356,0,0,749ec2d4b1e51d4aafe83652bc0802a299a54d3561d4847f2c289cb0919b6c2e,2024-02-27T14:20:06.637000
|
||||||
CVE-2024-27357,1,1,f153e366e5f22bba13648a73a9e1d0766d70f4fe1ae98dfae3539e68bea8504e,2024-07-26T17:15:11.580000
|
CVE-2024-27357,0,0,f153e366e5f22bba13648a73a9e1d0766d70f4fe1ae98dfae3539e68bea8504e,2024-07-26T17:15:11.580000
|
||||||
CVE-2024-27358,1,1,c6f05a12984d0b3095da6b6c5923490ab56b29a155188393a6caeac7a0b6e386,2024-07-26T17:15:11.650000
|
CVE-2024-27358,0,0,c6f05a12984d0b3095da6b6c5923490ab56b29a155188393a6caeac7a0b6e386,2024-07-26T17:15:11.650000
|
||||||
CVE-2024-27359,0,0,3ef57b8299026e901c7562e8bbf9bafac98cc1976d3917e5c32880417a0a2746,2024-02-26T16:32:25.577000
|
CVE-2024-27359,0,0,3ef57b8299026e901c7562e8bbf9bafac98cc1976d3917e5c32880417a0a2746,2024-02-26T16:32:25.577000
|
||||||
CVE-2024-2736,0,0,0ddab351a075258184e9da71bec86e9fd25b36338827c4a540a6ed9379b0bd6e,2024-04-10T13:23:38.787000
|
CVE-2024-2736,0,0,0ddab351a075258184e9da71bec86e9fd25b36338827c4a540a6ed9379b0bd6e,2024-04-10T13:23:38.787000
|
||||||
CVE-2024-27360,0,0,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c674486c8,2024-07-12T14:57:53.930000
|
CVE-2024-27360,0,0,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c674486c8,2024-07-12T14:57:53.930000
|
||||||
@ -250601,13 +250601,13 @@ CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3
|
|||||||
CVE-2024-3183,0,0,c23fa86047e2a9cfc0e658e5d74d50acd44e3f7588f87ba4b526ce93cd5f83dc,2024-06-27T03:15:50.447000
|
CVE-2024-3183,0,0,c23fa86047e2a9cfc0e658e5d74d50acd44e3f7588f87ba4b526ce93cd5f83dc,2024-06-27T03:15:50.447000
|
||||||
CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000
|
CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000
|
CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000
|
||||||
CVE-2024-31840,0,0,f97c85694957c5828e553ff416a846bf81628acd64082d25ca0de8b9f4b3ad8e,2024-05-21T16:53:56.550000
|
CVE-2024-31840,0,1,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000
|
||||||
CVE-2024-31841,0,0,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000
|
CVE-2024-31841,0,0,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000
|
||||||
CVE-2024-31843,0,0,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000
|
CVE-2024-31843,0,0,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000
|
||||||
CVE-2024-31844,0,0,3281a34a584a51d3381203dc05b509b4eefecc30c8879c7564ae226424b9e364,2024-05-21T16:53:56.550000
|
CVE-2024-31844,0,1,1937c7d5532d433d17341d1780be28aa6de78ba531c8095e0172be3243a39c54,2024-07-26T18:21:23.027000
|
||||||
CVE-2024-31845,0,0,5285f406c2c833baf2ad893e86a6252f005845d6cf83cc9d823751ca24673f2a,2024-07-03T01:55:28.633000
|
CVE-2024-31845,0,0,5285f406c2c833baf2ad893e86a6252f005845d6cf83cc9d823751ca24673f2a,2024-07-03T01:55:28.633000
|
||||||
CVE-2024-31846,0,0,9b0ce2d57c0813c3992666334f62ea2df99c41dc31797c0b704691d1b1dfe2ee,2024-07-03T01:55:29.393000
|
CVE-2024-31846,0,0,9b0ce2d57c0813c3992666334f62ea2df99c41dc31797c0b704691d1b1dfe2ee,2024-07-03T01:55:29.393000
|
||||||
CVE-2024-31847,0,0,1f57cff4e1c860358ec32617ff9a32d11689ce2407a45041946c9fc8cda2fb98,2024-05-21T16:53:56.550000
|
CVE-2024-31847,0,1,53a0e8aa8e7c2d4e134e67ee39829b21b85f8dbce70c54e8187380e67e89b35a,2024-07-26T18:20:51.120000
|
||||||
CVE-2024-31848,0,0,6424ac9a7ff5a7e43569e8e3dbf324feced9115393d08841249efb219c546140,2024-04-08T18:49:25.863000
|
CVE-2024-31848,0,0,6424ac9a7ff5a7e43569e8e3dbf324feced9115393d08841249efb219c546140,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-31849,0,0,71733c4e588c5b1de602b4b3a846cb85af7e707a6a801380baeaefec415f16bb,2024-04-08T18:49:25.863000
|
CVE-2024-31849,0,0,71733c4e588c5b1de602b4b3a846cb85af7e707a6a801380baeaefec415f16bb,2024-04-08T18:49:25.863000
|
||||||
CVE-2024-3185,0,0,9b4a71d513a26ff0472cd9eb59f40aaa78b7e93821c1ce593ecf8e2fe82c1ed8,2024-04-23T12:52:09.397000
|
CVE-2024-3185,0,0,9b4a71d513a26ff0472cd9eb59f40aaa78b7e93821c1ce593ecf8e2fe82c1ed8,2024-04-23T12:52:09.397000
|
||||||
@ -255020,6 +255020,8 @@ CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e
|
|||||||
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
|
CVE-2024-38867,0,0,4bc8a346a92423127914d7bd932870dc2a7efecb39fecaf6981a89bcdb11978c,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
|
CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000
|
CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000
|
||||||
|
CVE-2024-38871,1,1,7f14007af7ac9c3d1c19b32e69e58e0d3217b4301d228b52f45badd1055705e1,2024-07-26T18:15:03.137000
|
||||||
|
CVE-2024-38872,1,1,e40654788e0308f03ac8f1d05dd764d28cb85a11eb7af3ad24527e0096f59feb,2024-07-26T18:15:03.350000
|
||||||
CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000
|
CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000
|
||||||
CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
|
CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
|
||||||
CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
|
CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
|
||||||
@ -255168,6 +255170,7 @@ CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258a
|
|||||||
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
|
CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000
|
||||||
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-39303,0,0,a34ed591f51be43b3400c03523a5f8c55eb5097c5f908eacc0a16ec90a0e778f,2024-07-02T12:09:16.907000
|
CVE-2024-39303,0,0,a34ed591f51be43b3400c03523a5f8c55eb5097c5f908eacc0a16ec90a0e778f,2024-07-02T12:09:16.907000
|
||||||
|
CVE-2024-39304,1,1,4a59fa10429a1cbead456d7c61c84d5cf9b402ca7ecc8874fbf7fa68af7852c0,2024-07-26T18:15:03.557000
|
||||||
CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000
|
CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000
|
||||||
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
|
CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-39308,0,0,9b87f813f1d0c3d047f0b3cb0fa602208ca4159a3cdabc0e55a7e199b0ded98f,2024-07-08T15:49:22.437000
|
CVE-2024-39308,0,0,9b87f813f1d0c3d047f0b3cb0fa602208ca4159a3cdabc0e55a7e199b0ded98f,2024-07-08T15:49:22.437000
|
||||||
@ -255885,14 +255888,14 @@ CVE-2024-41319,0,0,bfb437b42963b0793282d02b7344fad2f16d4a046fba71ec7cf9211564769
|
|||||||
CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000
|
CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||||
CVE-2024-41353,1,1,54750c5e4569499a911de3318da8e088d2993f36d63804a6483e463d7bbf8dcd,2024-07-26T17:15:12.457000
|
CVE-2024-41353,0,0,54750c5e4569499a911de3318da8e088d2993f36d63804a6483e463d7bbf8dcd,2024-07-26T17:15:12.457000
|
||||||
CVE-2024-41354,1,1,a95131d06e3854ea273cae7793f7fb9586163bde0c7b59a8e751b31c88c88275,2024-07-26T17:15:12.513000
|
CVE-2024-41354,0,0,a95131d06e3854ea273cae7793f7fb9586163bde0c7b59a8e751b31c88c88275,2024-07-26T17:15:12.513000
|
||||||
CVE-2024-41355,1,1,c156409bf09a45d25f0a710ec5b831882f88d4579da6b8033e81746055bf5774,2024-07-26T16:15:03.277000
|
CVE-2024-41355,0,0,c156409bf09a45d25f0a710ec5b831882f88d4579da6b8033e81746055bf5774,2024-07-26T16:15:03.277000
|
||||||
CVE-2024-41356,1,1,908e97943b9d3b720955cc3e4e0fca842a705eff6efabb4bd05b53df77854d72,2024-07-26T16:15:03.357000
|
CVE-2024-41356,0,0,908e97943b9d3b720955cc3e4e0fca842a705eff6efabb4bd05b53df77854d72,2024-07-26T16:15:03.357000
|
||||||
CVE-2024-41357,1,1,e406848b5b12fe5669062298d4e1d7eaa05802f5c089a2c805f67cda0e099040,2024-07-26T16:15:03.427000
|
CVE-2024-41357,0,0,e406848b5b12fe5669062298d4e1d7eaa05802f5c089a2c805f67cda0e099040,2024-07-26T16:15:03.427000
|
||||||
CVE-2024-41373,1,1,778cdf8c556519d5fa0f9858e8b1c2d8771b65713cb8a295c3c6e29a356a24c1,2024-07-26T17:15:12.573000
|
CVE-2024-41373,0,0,778cdf8c556519d5fa0f9858e8b1c2d8771b65713cb8a295c3c6e29a356a24c1,2024-07-26T17:15:12.573000
|
||||||
CVE-2024-41374,1,1,254f3a51369b525a0addc0b6825753736c6168eb96b43ce28383cb3cff6e851f,2024-07-26T17:15:12.630000
|
CVE-2024-41374,0,0,254f3a51369b525a0addc0b6825753736c6168eb96b43ce28383cb3cff6e851f,2024-07-26T17:15:12.630000
|
||||||
CVE-2024-41375,1,1,f960a9806a9c11ad700294b80195f58903c2a066c06d02efa9551a219a53b697,2024-07-26T17:15:12.690000
|
CVE-2024-41375,0,0,f960a9806a9c11ad700294b80195f58903c2a066c06d02efa9551a219a53b697,2024-07-26T17:15:12.690000
|
||||||
CVE-2024-4138,0,0,0f7c3171dd014e7915cab9bf533b57ef231d5c30c6ae20f761b745c0767014ec,2024-05-14T19:17:55.627000
|
CVE-2024-4138,0,0,0f7c3171dd014e7915cab9bf533b57ef231d5c30c6ae20f761b745c0767014ec,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-4139,0,0,d53d7324701315788576d545d1c201804fb102fe113eecb6f188d5966156345d,2024-05-14T19:17:55.627000
|
CVE-2024-4139,0,0,d53d7324701315788576d545d1c201804fb102fe113eecb6f188d5966156345d,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c74,2024-06-10T18:15:36.313000
|
CVE-2024-4140,0,0,1a159a4a143aac5301b6b2c31977a1ba9c685fc606596154a85964b944248c74,2024-06-10T18:15:36.313000
|
||||||
@ -255983,12 +255986,12 @@ CVE-2024-41800,0,0,de10ad962b669cb0e83390124cefb714c566366c680caf05af31d5cbb0753
|
|||||||
CVE-2024-41801,0,0,7a4a47d8d4dd1e6f1ffdce276bee976a7b2cf6eead2e5e4570c33554bb7cb103,2024-07-26T12:38:41.683000
|
CVE-2024-41801,0,0,7a4a47d8d4dd1e6f1ffdce276bee976a7b2cf6eead2e5e4570c33554bb7cb103,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-41805,0,0,3c0ac10ed221b83ae49fa1acd7442eed035719ddcae0f0a73ac4e2fea2344179,2024-07-26T15:15:11.327000
|
CVE-2024-41805,0,0,3c0ac10ed221b83ae49fa1acd7442eed035719ddcae0f0a73ac4e2fea2344179,2024-07-26T15:15:11.327000
|
||||||
CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000
|
CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-41807,1,1,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000
|
CVE-2024-41807,0,0,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000
|
||||||
CVE-2024-41808,0,0,eee8cfba986a7a6e0e312c331c59644589f8c648c497985f0ce93d189bcf72fd,2024-07-26T12:38:41.683000
|
CVE-2024-41808,0,0,eee8cfba986a7a6e0e312c331c59644589f8c648c497985f0ce93d189bcf72fd,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-41809,0,0,073c063cc2026d2bccc0c562d18cc6e67373815bd6d185ae52f0ef0533a16567,2024-07-26T12:38:41.683000
|
CVE-2024-41809,0,0,073c063cc2026d2bccc0c562d18cc6e67373815bd6d185ae52f0ef0533a16567,2024-07-26T12:38:41.683000
|
||||||
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-41812,1,1,72e03de367442947df70eb890ebc6eb3d5703a91023448c09a49175b3a6f6ea9,2024-07-26T17:15:12.783000
|
CVE-2024-41812,0,0,72e03de367442947df70eb890ebc6eb3d5703a91023448c09a49175b3a6f6ea9,2024-07-26T17:15:12.783000
|
||||||
CVE-2024-41813,1,1,473cd175cc3d2e4776f6c69b35c7c89d44454e8b4cdec7987c900fec982b7760,2024-07-26T17:15:12.990000
|
CVE-2024-41813,0,0,473cd175cc3d2e4776f6c69b35c7c89d44454e8b4cdec7987c900fec982b7760,2024-07-26T17:15:12.990000
|
||||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
|
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-41825,0,0,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000
|
CVE-2024-41825,0,0,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000
|
||||||
@ -256013,6 +256016,7 @@ CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c7
|
|||||||
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
||||||
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000
|
||||||
|
CVE-2024-42007,1,1,6d84e2a9d95a04e8586c8d84a03cf469cc03d2519b9c47d0f96ca65f5ba68740,2024-07-26T19:15:10.917000
|
||||||
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
|
CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000
|
||||||
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
|
||||||
CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000
|
CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000
|
||||||
@ -258008,7 +258012,7 @@ CVE-2024-7007,0,0,d661b80f381c5e5a20762050cd26d7cdbc7442dd5816d04953c75c3bb9a2e0
|
|||||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-7047,0,0,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000
|
CVE-2024-7047,0,0,a8a34e25dd02e2f4bae12fb422d77becb4b340aa4ac90e0b4f1ca7d693febb09,2024-07-25T12:36:39.947000
|
||||||
CVE-2024-7050,1,1,87eb65c2fa0193ce614b51e63bdcf9b31a6757244623cb5a8ed10e25fea6ffc5,2024-07-26T16:15:03.847000
|
CVE-2024-7050,0,0,87eb65c2fa0193ce614b51e63bdcf9b31a6757244623cb5a8ed10e25fea6ffc5,2024-07-26T16:15:03.847000
|
||||||
CVE-2024-7057,0,0,134fb7ecedd83008f512f96c952415d9fe42c8f642d80f45f533232c0a6892c0,2024-07-25T12:36:39.947000
|
CVE-2024-7057,0,0,134fb7ecedd83008f512f96c952415d9fe42c8f642d80f45f533232c0a6892c0,2024-07-25T12:36:39.947000
|
||||||
CVE-2024-7060,0,0,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f49,2024-07-25T12:36:39.947000
|
CVE-2024-7060,0,0,290f41e25897864e5bc7f39b896930a92e0ee9d30e699cee7ddb424244610f49,2024-07-25T12:36:39.947000
|
||||||
CVE-2024-7062,0,0,2de7735f54d6d57f1a0e2f635d75e3ce3e1868b3b72f7dae9b650e963fe9e8e8,2024-07-26T12:38:41.683000
|
CVE-2024-7062,0,0,2de7735f54d6d57f1a0e2f635d75e3ce3e1868b3b72f7dae9b650e963fe9e8e8,2024-07-26T12:38:41.683000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user