Auto-Update: 2024-10-08T18:00:22.779292+00:00

This commit is contained in:
cad-safe-bot 2024-10-08 18:03:23 +00:00
parent 9867b3b572
commit 0b9405d753
157 changed files with 5777 additions and 1011 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-18655",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-12T17:15:10.610",
"lastModified": "2021-02-10T13:53:32.863",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T16:15:04.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -102,6 +102,10 @@
"Third Party Advisory"
]
},
{
"url": "https://github.com/0xhuesca/CVE-2019-18655/blob/main/filesharing_wizard_get_bof.rb",
"source": "cve@mitre.org"
},
{
"url": "https://www.0xhuesca.com/2019/11/cve-2019-18655.html",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1636",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.167",
"lastModified": "2023-12-29T17:15:49.923",
"lastModified": "2024-10-08T17:15:14.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -135,12 +135,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1636",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1636",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1637",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.213",
"lastModified": "2023-12-29T23:15:11.220",
"lastModified": "2024-10-08T17:15:14.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -180,12 +180,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1637",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-1638",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.277",
"lastModified": "2023-12-29T23:15:11.450",
"lastModified": "2024-10-08T17:15:14.883",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Bluetooth Security Feature Bypass Vulnerability"
"value": "Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this\u202fstatement\u202ffrom the Bluetooth SIG.\nTo address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key"
},
{
"lang": "es",
@ -155,12 +155,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1638",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1638",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1641",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.337",
"lastModified": "2023-12-29T17:15:50.357",
"lastModified": "2024-10-08T17:15:15.023",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -125,12 +125,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1641",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1642",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.400",
"lastModified": "2023-12-29T23:15:11.667",
"lastModified": "2024-10-08T17:15:15.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -165,12 +165,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1642",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1642",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1643",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.477",
"lastModified": "2023-12-29T17:15:50.553",
"lastModified": "2024-10-08T17:15:15.263",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -116,12 +116,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1643",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1643",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1644",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.540",
"lastModified": "2023-12-29T17:15:50.730",
"lastModified": "2024-10-08T17:15:15.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -116,12 +116,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1644",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1644",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1645",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.603",
"lastModified": "2023-12-29T23:15:11.920",
"lastModified": "2024-10-08T17:15:15.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -160,29 +160,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/161816/Microsoft-Windows-Containers-DP-API-Cryptography-Flaw.html",
"source": "secure@microsoft.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2021/Mar/33",
"source": "secure@microsoft.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1645",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1645",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1646",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.667",
"lastModified": "2023-12-29T23:15:12.130",
"lastModified": "2024-10-08T17:15:15.690",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -155,12 +155,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1646",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1646",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1647",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.727",
"lastModified": "2024-07-26T20:03:15.473",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T17:15:15.817",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
@ -251,12 +251,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1647",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1647",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1648",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.790",
"lastModified": "2023-12-29T23:15:12.527",
"lastModified": "2024-10-08T17:15:15.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -185,20 +185,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1648",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-504/",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1648",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1649",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.837",
"lastModified": "2023-12-29T23:15:12.890",
"lastModified": "2024-10-08T17:15:16.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1649",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1649",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1650",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.900",
"lastModified": "2023-12-29T23:15:13.240",
"lastModified": "2024-10-08T17:15:16.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -190,12 +190,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1650",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1650",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1651",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:30.963",
"lastModified": "2023-12-29T23:15:13.587",
"lastModified": "2024-10-08T17:15:16.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -196,12 +196,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1651",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1651",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1652",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.027",
"lastModified": "2023-12-29T23:15:13.910",
"lastModified": "2024-10-08T17:15:16.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1652",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1652",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1653",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.087",
"lastModified": "2023-12-29T23:15:14.277",
"lastModified": "2024-10-08T17:15:17.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1653",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1653",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1654",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.150",
"lastModified": "2023-12-29T23:15:14.613",
"lastModified": "2024-10-08T17:15:18.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1654",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1654",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1655",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.213",
"lastModified": "2023-12-29T23:15:14.967",
"lastModified": "2024-10-08T17:15:18.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1655",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1655",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1656",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.277",
"lastModified": "2023-12-29T23:15:15.213",
"lastModified": "2024-10-08T17:15:18.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -200,12 +200,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1656",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1656",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1657",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.340",
"lastModified": "2023-12-29T23:15:15.420",
"lastModified": "2024-10-08T17:15:18.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1657",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1657",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1658",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.400",
"lastModified": "2023-12-29T23:15:15.633",
"lastModified": "2024-10-08T17:15:18.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1658",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1658",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1659",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.463",
"lastModified": "2023-12-29T23:15:15.863",
"lastModified": "2024-10-08T17:15:19.263",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1659",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1659",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1660",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.510",
"lastModified": "2023-12-29T23:15:16.140",
"lastModified": "2024-10-08T17:15:19.670",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1660",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1660",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1661",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.573",
"lastModified": "2023-12-29T23:15:16.373",
"lastModified": "2024-10-08T17:15:20.003",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1661",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1661",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1662",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.637",
"lastModified": "2023-12-29T23:15:16.570",
"lastModified": "2024-10-08T17:15:20.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -155,12 +155,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1662",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1662",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1663",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.680",
"lastModified": "2023-12-29T23:15:16.767",
"lastModified": "2024-10-08T17:15:20.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -130,12 +130,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1663",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1663",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1664",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.743",
"lastModified": "2023-12-29T23:15:16.993",
"lastModified": "2024-10-08T17:15:20.443",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1664",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1664",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1665",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.807",
"lastModified": "2023-12-29T23:15:17.187",
"lastModified": "2024-10-08T17:15:20.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1665",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1665",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1666",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.853",
"lastModified": "2023-12-29T23:15:17.380",
"lastModified": "2024-10-08T17:15:20.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1666",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1666",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1667",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.917",
"lastModified": "2023-12-29T23:15:17.587",
"lastModified": "2024-10-08T17:15:20.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1667",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1667",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1668",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:31.977",
"lastModified": "2023-12-29T23:15:17.820",
"lastModified": "2024-10-08T17:15:21.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -200,12 +200,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1668",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1668",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1669",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.040",
"lastModified": "2023-12-29T23:15:18.013",
"lastModified": "2024-10-08T17:15:21.233",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -185,12 +185,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1669",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1669",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1670",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.087",
"lastModified": "2023-12-29T23:15:18.227",
"lastModified": "2024-10-08T17:15:21.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -130,12 +130,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1670",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1670",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1671",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.150",
"lastModified": "2023-12-29T23:15:18.430",
"lastModified": "2024-10-08T17:15:21.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1671",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1671",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1672",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.213",
"lastModified": "2023-12-29T23:15:18.627",
"lastModified": "2024-10-08T17:15:21.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -155,12 +155,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1672",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1672",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1673",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.277",
"lastModified": "2023-12-29T23:15:18.827",
"lastModified": "2024-10-08T17:15:21.743",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1673",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1673",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1674",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.337",
"lastModified": "2023-12-29T23:15:19.040",
"lastModified": "2024-10-08T17:15:21.893",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -200,12 +200,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1674",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1674",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1676",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.400",
"lastModified": "2023-12-29T23:15:19.287",
"lastModified": "2024-10-08T17:15:22.047",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1676",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1676",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1677",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.463",
"lastModified": "2023-12-29T17:15:51.207",
"lastModified": "2024-10-08T17:15:22.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -115,12 +115,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1677",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1677",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1678",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.510",
"lastModified": "2023-12-29T23:15:19.507",
"lastModified": "2024-10-08T17:15:22.300",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1678",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1678",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1679",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.573",
"lastModified": "2023-12-29T23:15:19.713",
"lastModified": "2024-10-08T17:15:22.457",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1679",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1679",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1680",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.637",
"lastModified": "2023-12-29T23:15:19.923",
"lastModified": "2024-10-08T17:15:22.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -194,12 +194,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1680",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1680",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1681",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.697",
"lastModified": "2023-12-29T23:15:20.120",
"lastModified": "2024-10-08T17:15:22.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -145,12 +145,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1681",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1681",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1682",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.743",
"lastModified": "2023-12-29T23:15:20.310",
"lastModified": "2024-10-08T17:15:22.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -155,12 +155,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1682",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1682",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-1683",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.807",
"lastModified": "2023-12-29T23:15:20.490",
"lastModified": "2024-10-08T17:15:23.033",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Bluetooth Security Feature Bypass Vulnerability"
"value": "Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this\u202fstatement\u202ffrom the Bluetooth SIG.\nTo address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key"
},
{
"lang": "es",
@ -185,12 +185,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1683",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1683",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2021-1684",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.853",
"lastModified": "2023-12-29T23:15:20.680",
"lastModified": "2024-10-08T17:15:23.157",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Bluetooth Security Feature Bypass Vulnerability"
"value": "Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this\u202fstatement\u202ffrom the Bluetooth SIG.\nTo address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key"
},
{
"lang": "es",
@ -185,12 +185,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1684",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1684",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1685",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.933",
"lastModified": "2023-12-29T23:15:20.890",
"lastModified": "2024-10-08T17:15:23.273",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -170,12 +170,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1685",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1685",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1686",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:32.993",
"lastModified": "2023-12-29T23:15:21.093",
"lastModified": "2024-10-08T17:15:23.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -145,12 +145,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1686",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1686",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1687",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.057",
"lastModified": "2023-12-29T23:15:21.283",
"lastModified": "2024-10-08T17:15:23.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -145,12 +145,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1687",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1687",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1688",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.167",
"lastModified": "2023-12-29T23:15:21.473",
"lastModified": "2024-10-08T17:15:23.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1688",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1688",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1689",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.230",
"lastModified": "2023-12-29T23:15:21.660",
"lastModified": "2024-10-08T17:15:23.713",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -170,12 +170,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1689",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1689",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1690",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.290",
"lastModified": "2023-12-29T23:15:21.840",
"lastModified": "2024-10-08T17:15:23.830",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -145,12 +145,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1690",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1690",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1691",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.353",
"lastModified": "2023-12-29T23:15:22.037",
"lastModified": "2024-10-08T17:15:23.933",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -140,12 +140,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1691",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1691",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1692",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.400",
"lastModified": "2023-12-29T23:15:22.237",
"lastModified": "2024-10-08T17:15:24.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -135,12 +135,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1692",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1692",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1693",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.463",
"lastModified": "2023-12-29T23:15:22.417",
"lastModified": "2024-10-08T17:15:24.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1693",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1693",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1694",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.510",
"lastModified": "2023-12-29T23:15:22.603",
"lastModified": "2024-10-08T17:15:24.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1694",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1694",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1695",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.557",
"lastModified": "2023-12-29T23:15:22.797",
"lastModified": "2024-10-08T17:15:24.447",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1695",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1695",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1696",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.620",
"lastModified": "2023-12-29T23:15:22.997",
"lastModified": "2024-10-08T17:15:24.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1696",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1696",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1697",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.683",
"lastModified": "2023-12-29T23:15:23.183",
"lastModified": "2024-10-08T17:15:24.743",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -170,12 +170,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1697",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1697",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1699",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.743",
"lastModified": "2023-12-29T23:15:23.557",
"lastModified": "2024-10-08T17:15:24.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1699",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1699",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1700",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.807",
"lastModified": "2023-12-29T23:15:23.733",
"lastModified": "2024-10-08T17:15:25.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1700",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1700",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1701",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.870",
"lastModified": "2023-12-29T23:15:23.930",
"lastModified": "2024-10-08T17:15:25.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1701",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1701",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1702",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.933",
"lastModified": "2023-12-29T23:15:24.130",
"lastModified": "2024-10-08T17:15:25.300",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1702",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1702",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1703",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:33.993",
"lastModified": "2023-12-29T23:15:24.373",
"lastModified": "2024-10-08T17:15:25.447",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -130,12 +130,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1703",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1703",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1704",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.040",
"lastModified": "2023-12-29T23:15:24.577",
"lastModified": "2024-10-08T17:15:25.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -200,12 +200,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1704",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1704",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1705",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.103",
"lastModified": "2023-12-29T17:15:51.413",
"lastModified": "2024-10-08T17:15:25.693",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -167,12 +167,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1705",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1705",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1706",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.167",
"lastModified": "2023-12-29T23:15:24.843",
"lastModified": "2024-10-08T17:15:25.820",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -190,12 +190,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1706",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1706",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1707",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.230",
"lastModified": "2023-12-29T17:15:51.617",
"lastModified": "2024-10-08T17:15:25.980",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -130,12 +130,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1707",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1707",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1708",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.277",
"lastModified": "2023-12-29T23:15:25.043",
"lastModified": "2024-10-08T17:15:26.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1708",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1708",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1709",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.357",
"lastModified": "2023-12-29T23:15:25.240",
"lastModified": "2024-10-08T17:15:26.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -205,12 +205,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1709",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1709",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1710",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.417",
"lastModified": "2023-12-29T23:15:25.417",
"lastModified": "2024-10-08T17:15:26.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -195,12 +195,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1710",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1710",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1711",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.463",
"lastModified": "2023-12-29T17:15:51.820",
"lastModified": "2024-10-08T17:15:26.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -165,12 +165,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1711",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1711",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1712",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.527",
"lastModified": "2023-12-29T17:15:52.010",
"lastModified": "2024-10-08T17:15:26.663",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -125,12 +125,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1712",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1712",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1713",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.573",
"lastModified": "2023-12-29T17:15:52.213",
"lastModified": "2024-10-08T17:15:26.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -150,12 +150,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1713",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1713",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1714",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.637",
"lastModified": "2023-12-29T17:15:52.413",
"lastModified": "2024-10-08T17:15:26.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -197,12 +197,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1714",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1714",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1715",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.697",
"lastModified": "2023-12-29T17:15:52.610",
"lastModified": "2024-10-08T17:15:27.017",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -185,12 +185,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1715",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1715",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1716",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.743",
"lastModified": "2023-12-29T17:15:52.820",
"lastModified": "2024-10-08T17:15:27.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -180,12 +180,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1716",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1716",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1717",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.807",
"lastModified": "2023-12-29T17:15:53.013",
"lastModified": "2024-10-08T17:15:27.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -125,12 +125,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1717",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1717",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1718",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.870",
"lastModified": "2023-12-29T17:15:53.217",
"lastModified": "2024-10-08T17:15:27.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -115,12 +115,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1718",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1718",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1719",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.933",
"lastModified": "2023-12-29T17:15:53.407",
"lastModified": "2024-10-08T17:15:27.503",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -120,12 +120,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1719",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1719",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1723",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.993",
"lastModified": "2023-12-29T17:15:53.777",
"lastModified": "2024-10-08T17:15:27.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -151,12 +151,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1723",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1723",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1725",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:35.040",
"lastModified": "2023-12-29T17:15:54.167",
"lastModified": "2024-10-08T17:15:27.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -125,12 +125,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1725",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1725",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-43940",
"sourceIdentifier": "security@atlassian.com",
"published": "2022-02-15T04:15:07.177",
"lastModified": "2022-07-27T14:41:18.273",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T17:35:01.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49037",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:03.770",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:08:55.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*",
"versionEndExcluding": "3.3.0-15082",
"matchCriteriaId": "25A1D284-49F9-4F67-B9A3-6451803B1B36"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49038",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:04.940",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:08:35.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*",
"versionEndExcluding": "3.3.0-15082",
"matchCriteriaId": "25A1D284-49F9-4F67-B9A3-6451803B1B36"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49039",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.187",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:08:08.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*",
"versionEndExcluding": "3.4.0-15721",
"matchCriteriaId": "52C4C4A2-ADB8-4E6E-892C-7FC403068B36"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49040",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.390",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:07:11.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*",
"versionEndExcluding": "3.4.0-15721",
"matchCriteriaId": "52C4C4A2-ADB8-4E6E-892C-7FC403068B36"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49041",
"sourceIdentifier": "security@synology.com",
"published": "2024-09-26T04:15:05.620",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:06:51.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "security@synology.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:synology:drive_client:*:*:*:*:*:desktop:*:*",
"versionEndExcluding": "3.5.0-16084",
"matchCriteriaId": "FA63ED01-FFC4-4304-B511-8FF3260AEF74"
}
]
}
]
}
],
"references": [
{
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_10",
"source": "security@synology.com"
"source": "security@synology.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25835",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T00:15:10.343",
"lastModified": "2024-01-29T22:15:08.103",
"lastModified": "2024-10-08T17:15:27.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThere is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High.\u00a0\n\n"
"value": "There is a stored Cross-site Scripting vulnerability\u00a0in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25836",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T04:15:11.917",
"lastModified": "2023-08-07T19:33:38.560",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T17:15:28.033",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are low.\n\n\n\n"
"value": "There is a Cross-site Scripting vulnerability\u00a0in Esri Portal Sites in versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. \u00a0The privileges required to execute this attack are low."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25837",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T04:15:12.377",
"lastModified": "2024-01-29T22:15:08.220",
"lastModified": "2024-10-08T17:15:28.127",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThere is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High. \n\n\n\n"
"value": "There is a Cross-site Scripting vulnerability\u00a0in Esri ArcGIS Enterprise Sites versions 10.8.1 \u2013 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. \u00a0The privileges required to execute this attack are high.\u00a0 \u00a0\n\nThe impact to Confidentiality, Integrity and Availability are High."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25840",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T19:15:10.160",
"lastModified": "2024-02-23T19:38:32.780",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T17:15:28.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThere is a Cross-site Scripting vulnerability\u00a0in ArcGIS Server in versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. \u00a0The privileges required to execute this attack are high.\n\n\n\n"
"value": "There is a Cross-site Scripting vulnerability\u00a0in ArcGIS Server in versions 10.8.1 \u2013 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. \u00a0The privileges required to execute this attack are high."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25841",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-07-21T19:15:10.260",
"lastModified": "2024-02-23T18:13:19.333",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T17:15:28.347",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThere is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 \u2013 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n\nMitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.\n\n\n"
"value": "There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 \u2013 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.\n\nMitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities."
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25848",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-08-25T19:15:08.670",
"lastModified": "2023-08-31T14:29:48.863",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T17:15:28.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\n\n\nArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. \n\nThe information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.\n\n\n\n\n\n\n\n\n"
"value": "ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. \n\nThe information disclosed is limited to a single attribute in a database connection string. No business data is disclosed."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-29446",
"sourceIdentifier": "ot-cert@dragos.com",
"published": "2024-01-10T21:15:08.603",
"lastModified": "2024-01-19T19:50:28.443",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T16:15:04.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.\u00a0"
"value": "An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-40"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0057",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-01-09T18:15:46.980",
"lastModified": "2024-05-29T00:15:11.080",
"lastModified": "2024-10-08T16:15:05.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -627,13 +627,6 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240208-0007/",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20434",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.090",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:20:30.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,480 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "27E0750C-A622-49D6-A8EF-B59E2F8F1912"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "36A5F20F-3F38-4FB9-B49D-28569EB1A763"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE165207-A066-44C1-B78A-6EFD80023204"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1098FCEA-6A9F-4634-A0EF-EC55ABCCEA3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8577AF01-F2C7-48D3-AB0B-78BD63A60029"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31789E98-7C8D-4C5A-8A3F-FC9AFE9A248C"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20477",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:17.130",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:00:30.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2\\(1e\\)",
"matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.2.2",
"matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20492",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T17:15:17.763",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T16:07:26.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,420 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "73A2A365-59AA-48B9-9ABF-914C2B80C7A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "98BDD88B-DF43-4F7C-A6C0-1EECE9C85355"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "BE860BF8-AC42-4C10-BC65-9DBF8050E682"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "C03A7AEA-8411-4693-84A9-7ADC7F08D87C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "0D98AE26-55C9-4BA7-B82C-5B328E689418"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "D50E9F77-0575-43E0-AF83-9A932F4D4F73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5:*:*:*:expressway:*:*:*",
"matchCriteriaId": "9F91E793-E37D-4823-B078-DA96AB422967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "3F16B185-879A-4BA8-B4EB-B032FC8B9674"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "5D58C2C4-F0CB-440A-885A-173DC9B5D32F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "95FC0285-58F4-4C17-9DB0-0A495A7FE9BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.6:*:*:*:expressway:*:*:*",
"matchCriteriaId": "E9BB8E50-74EF-4726-A069-C90B09201593"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.6.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "8AEF5B51-8609-40D8-A01B-6696B012FCB0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7:*:*:*:expressway:*:*:*",
"matchCriteriaId": "C0DCF6AA-84C1-4B1A-80B0-6942707D9CAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "1590C980-506C-4689-AA91-6C647CC3AF28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "4E9D0839-13E1-4C95-AFEF-3071A977AB5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "6E714552-FDEF-4971-959F-3615E34E6F5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8:*:*:*:expressway:*:*:*",
"matchCriteriaId": "20A5441C-7798-4EAD-9428-6DA4EF354807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "1BE2198F-DF53-497E-9945-062ADD3787F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "0D7C383F-30E2-4F22-B35D-B73671D1BBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "B478B2B7-269C-4813-A004-225D90715A08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9:*:*:*:expressway:*:*:*",
"matchCriteriaId": "CBEB2506-7F1B-4227-B5BD-47B28778D7AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "A000BA48-4ABC-46D4-89EB-CEA8D754B708"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "66CBF53D-4174-463A-B902-E50FF63E39B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "BFFD53C6-D23A-4CEC-AD1C-7D6A8B920566"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "F642A732-BA7E-493F-BE62-273997AF3328"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "76688320-EE54-4662-BE15-F721EA55D5D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "7C3B3879-FCDF-4D12-9B81-24EC70FF6CF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.4:*:*:*:expressway:*:*:*",
"matchCriteriaId": "F0B562E3-5E36-4899-A57A-90E653737B09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "EA6FF488-FBED-40E6-92CC-39B8749171C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "F84981B5-0E55-40D6-92F9-57C03A24A44A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "A9A37F14-5F65-4C99-A0E2-EACABEDF2286"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "6F7DC504-15CA-4D44-90E5-5684F474A7A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.4:*:*:*:expressway:*:*:*",
"matchCriteriaId": "36BD629F-0183-41C2-9547-08EAE359BD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "26301BB9-38C0-473F-9FAF-E5DF70E29A36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "29C38DD2-E763-4B59-83C7-050D08D91637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "684A39DB-7850-4932-922D-9E7A62FC608A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "81B09C18-F930-4B67-8309-7FA0889039C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.4:*:*:*:expressway:*:*:*",
"matchCriteriaId": "E172DA2A-37B4-4387-AE92-0F0D4F60F736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.5:*:*:*:expressway:*:*:*",
"matchCriteriaId": "D09EB9B0-5212-4E32-95E9-93BEC53B4AA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.6:*:*:*:expressway:*:*:*",
"matchCriteriaId": "2221FF76-F13A-4E8D-88EB-2757AB6DCDCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.7:*:*:*:expressway:*:*:*",
"matchCriteriaId": "FBEE5E76-A827-4031-B1C1-4961C277C5F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.8:*:*:*:expressway:*:*:*",
"matchCriteriaId": "156F7D5E-DC54-4687-B80F-3281C779135F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.9:*:*:*:expressway:*:*:*",
"matchCriteriaId": "8BDFCFC1-8230-4051-9B5D-73349C288E46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "98E3BF27-037E-474F-B55A-12750943499D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "9F2CF11F-735B-458F-9F2F-8E2322FC39DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "22089B78-2048-4192-826B-76AA3FAE7E22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "C826FD6A-948C-4B09-8061-E800BD6E1963"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.4:*:*:*:expressway:*:*:*",
"matchCriteriaId": "2CE43D3E-BC2F-4CBC-8213-13028B88B1B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.7.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "60DF84F3-B71E-4860-A6B7-61AB5D201702"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x12.7.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "06852E84-8BEC-403D-BB70-07A4F51054E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "EDDF2FE3-585A-4A3D-9E14-A8AE02301223"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "6C6A62AC-7214-4FB0-A2C9-82BDEE6D7C7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "7090851D-B154-435B-8F25-06E365334D68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "D1A6AB08-E97C-4865-B225-0EA77AA73366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.4:*:*:*:expressway:*:*:*",
"matchCriteriaId": "0EE6F371-C8E2-4B4E-855E-882395C02801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.5:*:*:*:expressway:*:*:*",
"matchCriteriaId": "711A5AE8-087C-4471-BA1B-C3B70EED1427"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.6:*:*:*:expressway:*:*:*",
"matchCriteriaId": "4B0339D9-9CA8-4376-A60B-94429B993E80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.7:*:*:*:expressway:*:*:*",
"matchCriteriaId": "3AA3FAD1-7F25-4D57-AA14-822CDE7FE0FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.8:*:*:*:expressway:*:*:*",
"matchCriteriaId": "9F656226-EAB4-4B9D-965B-872FA62BDA26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.9:*:*:*:expressway:*:*:*",
"matchCriteriaId": "1543EF6E-9B45-4FD4-B435-6579FE7F2C54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.10:*:*:*:expressway:*:*:*",
"matchCriteriaId": "1AA8FED6-4E07-4C0D-8DF7-605C230B7D21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.11:*:*:*:expressway:*:*:*",
"matchCriteriaId": "0343AAE7-94DF-43E4-AF29-9EC1B320A58E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "CA0CFF47-8107-40BC-9E29-69E829A7FCE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "89E4FDB4-B74A-4622-A47F-2EDCB6D57F57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "CC1B741E-9D6F-428F-B403-2FB0DF52DCE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.5:*:*:*:expressway:*:*:*",
"matchCriteriaId": "16FDBC96-2C3A-4615-8AE7-90DEB68E2952"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.6:*:*:*:expressway:*:*:*",
"matchCriteriaId": "05AB5287-62D0-4510-B4AF-9AC0A757CE3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.2.7:*:*:*:expressway:*:*:*",
"matchCriteriaId": "0DAE5BA7-833B-4FB1-8F04-80FC02BD444F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "10582312-5717-4A91-AE3E-9A907C8A338B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "8FEE44F0-FBC5-470F-BB66-C1C672032B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "8B1EDE63-DE13-47AC-BC19-6F5EB4D00BFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "B2B49119-47FF-4751-A9EC-D34ABAD3A9E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.4:*:*:*:expressway:*:*:*",
"matchCriteriaId": "193C4B32-EE7D-42CE-B851-00CDDBA07D40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.5:*:*:*:expressway:*:*:*",
"matchCriteriaId": "9137356B-264C-4D1F-B37A-DB5FE96B1A1E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x14.3.6:*:*:*:expressway:*:*:*",
"matchCriteriaId": "4B8FD463-4EC1-4BD3-AB01-2915D061C57A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.0:*:*:*:expressway:*:*:*",
"matchCriteriaId": "7DB74EB7-1B43-4F61-818C-CACC4661F9DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.1:*:*:*:expressway:*:*:*",
"matchCriteriaId": "9B8E94B6-6B64-4060-B264-623B7CAA456E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.2:*:*:*:expressway:*:*:*",
"matchCriteriaId": "A5BF2248-19FB-4F1B-AB1D-1892445AB15B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:telepresence_video_communication_server:x15.0.3:*:*:*:expressway:*:*:*",
"matchCriteriaId": "0477933F-C946-4ED9-B89A-C0D9E40FCE06"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expw-escalation-3bkz77bD",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More